The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
The forthcoming fifth generation (5G) wireless network is envisioned as highly heterogeneous that can support future applications demanding seamless coverage, low latency and high throughput. These requirements pose stringent challenges on the handover authentication design. In this article, we present a fast and efficient physical layer authentication scheme for software-defined-radio (SDN) enabled...
In order to effectively extend the coverage of an eNodeB (eNB), a simple relay node (RN) is the efficient solution with fiber-wireless connectivity as the interface between eNB and RN. The optimum coverage enhancement can be achieved by connecting many RNs to a single eNB, which requires high splitting ratio at the optical access layer. Therefore, high optical launch power (OLP) is a primary requirement...
In this study, a concept of the Internet of People based augmented smart home system is proposed. Compared with the standard smart house concept, an electronic smart caretaker is introduced into this system as a virtual family member to care for family members and house. The caretaker monitors the house status and reports to users. He also intuitively provides reminder and suggestion mechanism for...
Internet of Things (IoT) devices pose a serious threat to the web as poorly configured or faulty devices can be used for massive Distributed Denial of Service attacks. High jacked IoT devices that act like real users are a particular problem that present significant difficulties for traditional detection methods. An adaptive, real time scoring system for detecting such attacks is proposed that does...
Previous work has developed a remarkably low cost method which allows IoT devices to securely join domestic WiFi networks. Implementation of this method has uncovered a weakness in that only controllers (usually smart phones) capable of programmatically controlling hotspot mode can successfully implement the protocol. It is demonstrated that this weakness greatly compromises the open nature of this...
The Tactile Internet refers to the communication networks that have a closed control loop of tactile input and audio and/or visual feedback. Example applications include telerehabilitation and virtual training. To ensure that these applications have unnoticeable latencies and thus satisfied quality-of-service and quality-of-experience requirements, the Tactile Internet needs to guarantee round-trip...
The recent advancement of industry automation is underpinned by the continuous development of the industrial network. This exponential growth is driving the fourth generation industry revolution (FGIR). To meet the requirement of FGIR, there is an ongoing evolution of industrial network from Fieldbus to Ethernet that has emerged a new opportunity to integrate Software Defined Networking (SDN) technique...
Leveraging multi-path transmission in an energy-efficient manner is of great importance for mobile devices in heterogeneous wireless networks. Recently, Multi-Path TCP (MPTCP) has been introduced as a potential solution that could leverage this path diversity, but making it energy efficient not only depends on the end-user's observed interface capacity but also on the other competitors' decision....
In this paper, we discuss using a game-theoretic approach for Network Slicing (in particular RAN Slicing) that enables fully dynamic allocation of spectrum. The algorithm allows radio resources from across the whole spectrum to be allocated to users from different slices, so avoiding the inefficiencies of fixed slices. By using game theory, we can apply constraints on the resources allocated to individual...
This study evaluates the current state of wireless network security in the CBD of Nuku'alofa. Wireless Networks have grown significantly since their introduction. Security protocols supplied with the wireless equipment have reached a level of strong and robust security. However, security remains a problem; this study aims to answer two questions. What is the status of wireless network growth and security...
With the rapid development of science and technology and the growing popularity of computer networks, the scale of network users is gradually expanding, and the behavior of network users is becoming more and more complicated. A large number of studies show that the user's actual interest is closely related to the browsing behavior on the web page. Through the user browsing behavior analysis can obtain...
Tactical military communication networks operate in highly complex environments. The survivability and the range of these networks, especially the mobile wireless segments, are and will be a challenge for the present and future defence forces. OPAL, an autonomous system, has been previously presented where it extended the range and improved the survivability of tactical military networks using unmanned...
In optical wireless communications, because of the attenuation of light and the shadowing of the channel, partial erasure channel, which means failing to receive a part of transmitted light steams, may raise. It is of importance to design a system compatible with partial erasure channel. In this paper, a new turbo coded APPM system is proposed. APPM is a modulation technique combining with amplitude-shift...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.