The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Underwater acoustic grid network is promising for providing high data rate and wide coverage service. For the scheduled time division multiple access (TDMA) protocols in the underwater acoustic grid networks, scheduling is an essential part to achieve reliable and energy efficient performance. Scheduling not only completely guarantees the interference free transmission in the network, but also makes...
In this work, a relay-selection scheme is proposed for underlay cognitive radio networks, with fixed and adaptive relaying power. The relay-selection and power allocation is based on the calculation of the log-likelihood ratio (LLR) value, calculated at each of the relay nodes available in the secondary network. No interference is caused to the primary network, through the satisfaction of a low power...
In this paper, the end-to-end error performance of conventional dual-hop system where a source communicates with the destination over an energy harvesting (EH) relay in the lack of a direct link between them, is investigated. In the first phase, relay decodes the signal received from the source, from which it harvests energy according to time switching (TS)-based relaying and power splitting (PS)-based...
In this paper, two methods to improve the secrecy of cooperative transmissions using unshared jamming are investigated in which only the source and destination nodes know the jamming signals. The jamming signals are based on unique cipher keys obtained on the high layers. In the first proposed method (SJ protocol), a source combines its secrecy signal with its jamming signal using the power allocation...
Bringing to the market intelligent vehicles is one of the current challenges faced by car manufacturers. These vehicles must be able to communicate in order to cooperate and be more effective. The issue of inter-vehicle communications is an active research topic. This paper proposes a reliable geographical broadcasting protocol which has a twofold goal: limiting the risk of interference and reducing...
The recent enhancement of sensor devices, such as the Micro-Electro Mechanical Devices (MEMs) used for information collection and dissemination, has led to the emergence of the Internet of Things (IoT). This new paradigm overlaps with many research area such as the Wireless Sensor Networks (WSNs) where sensor nodes are deployed over an area to perform local computations based on information gathered...
This paper presents a practical methodology for designing, implementing and deploying IPv6 networks. We use a virtual lab to simulate topologies for different scenarios. These topologies are designed programmatically and then, tested for connectivity and efficiency. In particular, these scenarios include translation mechanisms such as DNS64 and NAT64, tunneling mechanisms such as 6to4 and 6RD and...
Physical layer security is becoming a promising technology to face the security challenges of diversified and rapidly-growing wireless applications. In this paper, we propose a three-hop secure Orthogonal Frequency Division Multiplexing (OFDM) transmission protocol for the wireless networks with untrusted relays. In the proposed protocol, instead of exploiting the degree of freedom over spatial domain...
We propose an underlay decode-and-forward cognitive (UDFC) scheme under joint effects of hardware impairments at secondary users and interference constraints at multi primary receivers. In this scheme, the transmit powers of a source node and relays are constrained by interference thresholds of primary receivers in which the best relay is selected has the highest decoding capacity from the source...
Simultaneous wireless information and power transfer (SWIPT) is an effective way for energy-constrained unmanned aerial vehicle (UAV) to prolong the network lifetime. In this paper, an amplify and forward (AF) relaying network is considered, where an energy-constrained UAV harvests energy and information simultaneously from base station and then transmits the information to the destination node. Based...
This paper describes a new implementation of the Elastic Multicast (EM) protocol including new design enhancements for improved dynamic operation. The paper also presents additional performance data collected from emulation-based mobile network experiments. EM is a low complexity extension to Simplified Multicast Forwarding (SMF) that adds group-specific dynamic pruning of the SMF-based multicast...
Vehicular Ad-hoc NETworks (VANETs) are composed of moving vehicles with the ability to process, store, and communicate via wireless medium. VANETs promise a wide scope of services, such as, safety and security, traffic efficiency, and others. For instance, a VANET application can detect, control and reduce traffic congestion based on data that describes traffic patterns. However, disseminating data...
Traditional vehicular routing protocols cannot accurately foresee future location of each vehicle for efficient packet forwarding. Recently, the data mining approach has been applied to analyze huge vehicle trajectory data. In this paper, we propose a novel trajectory-based routing (NTR) protocol to improve the packet replication efficiency of vehicles in the Vehicular Delay Tolerant Network (VDTN)...
Numerous IoT devices in wireless network interact and cooperate with each other to achieve diverse intelligent services. Such devices use static channel for wireless transmission, making the whole network vulnerable to eavesdroppers. This raises a need for means to allow secure data transmission/reception between IoT routing nodes. The concept of antenna diversity is used to enhance secrecy capacity...
Glossy is a flooding-based communication primitive for low-power wireless networks that leverages constructive interference to achieve high reliability. The Low-power Wireless Bus (LWB) uses Glossy to abstract an entire wireless network into a shared bus like topology. As Glossy is not designed as a secure communication protocol, Glossy and hence LWB are vulnerable to unauthorised eavesdropping and...
The age of information is a measure of the freshness of continually updated information, which has been studied theoretically for a variety of queueing models. We conduct an experimental evaluation of the age of information in various emulated network settings to see how well the queue models approximate a network for the purpose of age. We use CORE and EMANE to deploy a one-dimensional multi-hop...
This paper investigates the link selection policy for secure communications over a buffer-aided two-hop communication link. It is assumed that a source wishes to send information to a destination with the aid of a trusted half-duplex relay node compromised by a passive eavesdropper, and that there is no direct link between the source and the destination. The buffer-aided relay forwards the information...
Polar codes has a better bit error rate (BER) performance than low-density parity-check (LDPC) and turbo codes with lower coding and decoding complexity. The polar-coded cooperation can provide significant enhancement of data rate and link reliability. However, simply binary coded cooperation cannot meet the requirements of spectral efficiency. In order to improve the spectral efficiency, this paper...
Energy efficiency has been a growing requirement in the latest development of wireless communication systems, and it has led to research on off-grid relay nodes with simultaneous wireless information and power transfer (SWIPT) capabilities. Two SWIPT protocols have been developed in the past, named power splitting and time switching. Both protocols have been theoretically proven to improve energy-constrained...
This paper investigates the secrecy performance of a single hop wireless relay network employing power splitting (PS) energy harvesting (EH) technique, using the term secrecy rate. In this network, a relay is present between source and destination to forward signal to the destination and a power beacon provides power to relay and source using EH technique to perform their respective roles. The secrecy...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.