The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
An Advanced Persistent Threat (APT) attacker applies multiple sophisticated methods to continuously and stealthily attack targeted cyber systems. In this paper, the interactions between an APT attacker and a cloud system defender in their allocation of the Central Processing Units (CPUs) over multiple devices are formulated as a Colonel Blotto game (CBG), which models the competition of two players...
The first step in the deployment of wireless sensor networks for real-life applications is sensor placement. This step is of primary importance as it not only determines the network's cost, but also affects energy consumption, network lifetime, and the quality of service provided by the network. In this paper, we tackle the sensor placement problem that is NP-hard. The goal is to optimize the number...
Localization in complex indoor environments with RF signal is a challenging task. Via this technique, the signal is easily affected by obstacles and environmental noise due to the broadcast nature of RF signal transmission. In this paper, we observe that seismic signal is more oriented than the RF signal, and thus is more suitable for localization in an complex indoor environment with obstacles. Motivated...
Due to the severe environment along the High-Speed Railway (HSR), it is essential to research an efficient HSR communication system. In our previous work, we collected and analyzed an amount of the first hand dataset of signal intensity in HSR networks. We first observed that the link status variation presented an obvious Two-Time-Scale characteristics. However, that work did not analyze the cause...
Information about urban safety, e.g., the safety index of a position, is of great importance to protect humans and support safe walking route planning. Despite some research on urban safety analysis, the accuracy and granularity of safety index inference are both very limited. The problem of analyzing urban safety to predict safety index throughout a city has not been sufficiently studied and remains...
In this paper, a novel multi-bit simultaneous query technique, called the Coherent Analog Bloom Filter (CABF), is proposed for wireless networks. CABF allows the Access Point (AP) of the network to gather multiple bits of key information from nodes in the network simultaneously, such as the identities of the active nodes and the data packet sizes. With CABF, the nodes transmit signals on selected...
Wireless Sensor Networks (WSNs) have been widely adopted to monitor various ambient conditions including critical infrastructures. Since power grid is considered as a critical infrastructure, and the smart grid has appeared as a viable technology to introduce more reliability, efficiency, controllability, and safety to the traditional power grid, WSNs have been envisioned as potential tools to monitor...
In the Era of the Internet of Things (IoT) the validity of sensing coverage is of utmost importance as it affects the reliability of sensing services. The presence of anchor misplacement poses a challenge on the validity of sensing coverage. This kind of challenge has generally been overlooked in sensing coverage research. In this paper, we investigate the sensing validity under several scenarios...
User Equipments (UEs) that send data must advertise the upcoming transmission by broadcasting signaling messages over the Physical Sidelink Control Channel (PSCCH). Thus, it is important for the network operator to define the PSCCH resource pool to maximize the probability that each UE will be able to successfully decode all of the control messages that appear on the PSCCH. For UEs operating in Mode...
Mobile devices nowadays can connect to the network very conveniently using cellular data network or WiFi. However, latency is still a challenge caused by the stability and the availability of the network, mainly in the context of mobile environments. In this paper, we propose an architecture based on a Cloudlet model using CAching and pre-FEtching scheme (CAFE scheme) to improve data access efficiency...
We consider a scenario in which an operator installs (small cell) base stations on top of city buses to offer better quality of experience (QoE) to their passengers. In that case, providing a consistent backhaul rate (i.e., a constant rate at all times) to these base stations could help mitigate the effects of mobility on the QoE. Specifically, we perform the analysis to determine the maximum consistent...
Classical control and management plane for computer networks is addressing individual parameters of protocol layers within an individual wireless network device. We argue that this is not sufficient in phase of increasing deployment of highly re-configurable systems, as well as heterogeneous wireless devices co-existing in the same radio spectrum. They demand harmonized, frequently even coordinated...
In this paper, we study mobile data offloading problem under the architecture of mobile cloud computing (MCC), where mobile data can be delivered by cellular, WiFi and Device-to-Device (D2D) communication networks. In order to minimize the overall cost for data delivery task, it is crucial to reduce cellular network usage while satisfying delay requirements. In the proposed model, a portion of the...
In this paper, we consider the design of analogue beamformers for the downlink of multi-user massive multiple-input-multiple-output (MIMO) systems. We specifically investigate systems where both link ends are equipped with hybrid digital/analog (HDA) beamforming structures, where the analog beamformers are adapted based on second order channel statistics, reducing the training overhead as well as...
Due to its mathematical tractability, the homogeneous Poisson point process (PPP) has been employed to model wireless networks and analyze their performance. The PPP has the fundamental property that in a network with n nodes, the n nodes are distributed independently from each other. As such the PPP is not a suitable model for many networks where there exists a repulsion among the nodes. In order...
We consider a single-cell scenario involving a single base station (BS) with a massive array serving multi-antenna terminals in the downlink of a mmWave channel. We present a class of multiuser MIMO schemes, which rely on uplink training from the user terminals, and on uplink/downlink channel reciprocity. The BS employs virtual sector-based processing according to which, user-channel estimation and...
Wireless power transfer (WPT) has emerged as an attractive solution to power future wireless communication networks. In this paper, we consider WPT using power beacons (PBs) for a millimeter wave (mmWave) wireless ad hoc network. Using stochastic geometry, we derive the moment generating function (MGF) and the nth cumulant of the aggregate received power from PBs at a reference receiver in closed-form...
In this paper, we develop a low-complexity channel estimation for hybrid millimeter wave (mmWave) systems, where the number of radio frequency (RF) chains is much less than the number of antennas equipped at each transceiver. The proposed channel estimation algorithm aims to estimate the strongest angle-of-arrivals (AoAs) at both the base station (BS) and the users. Then all the users transmit orthogonal...
When implementing single radio frequency (RF) chain multi-user (MU) millimeter-wave (mmWave) systems, an RF beamforming algorithm with a short beam training overhead is essential. In this paper, we propose a new MU RF beamforming algorithm based on the conventional RF beam training method in IEEE 802.11ad. Then, we investigate its asymptotic behavior for a large number of users scenario. We show that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.