The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The security of Cyber Physical Systems is a key factor since these architectures are being applied in many critical scenarios, such as power or water plants, hospitals, etc. In the state of the art, several approaches have been proposed to deal with the possible attacks that could be inferred to the Cyber Physical Systems. This contribution proposes a method for counter fighting the injection of tampered...
The enhancement of wireless technologies for machine-type communications and the Internet of things attracts the attention of recent communications research. The IEEE 802.11 task group TGah proposes to use group-based contention scheme in the MAC of its proposed amendment 11ah in order to cope with massive power constrained stations (STAs) per access point (AP). However the detailed regrouping technique...
This paper presents an approach to predict Quality of Experience (QoE) in WLAN networks based on information extracted from non-intrusive measurements which only require control and management frame capture. This procedure avoids costly equipment and it is forward compatible. Specifically, three measurements have been taken: the relative time duration of clear-to-send messages, the percentage of blocked...
The Phantom cell concept is a solution for high-traffic outdoor environments that can also support good mobility and connectivity in ultra-dense network. In a phantom cells network, a centralized Macrocell controls all phantom cells within its coverage area and the C-Plane and U-Plane are split. Many issues need to be addressed for this architecture including radio resources allocation and cross/co...
Backscatter wireless communication (BWC) is a promising research area for the low power Internet of Things (IoT) devices. A substantial number of research works have been conducted in this area to increase the range of BWC. Along with physical layer achievements in BWC, an efficient medium access control (MAC) protocol is mandatory to attain the optimal benefit. In this paper, a novel MAC protocol...
During recent years, we have witnessed an explosion in the Internet of Thing (IoT) in terms of the number and types of physical devices. However, there are many limitations of these devices regarding their computing power, storage, and connection capabilities. They affect on-device processing of sensed data significantly. Centralized treatment of IoT data has proven challenging for many use cases...
With over 1 billion vehicles in operation over the world1 and steadily growing cities, intelligent traffic management has become inevitable in order to preserve quality of life as we know it. Analyzing and predicting the movement behavior of traffic participants helps providing forward-looking solutions and plays a major role in intelligent traffic systems (ITS), in the field of location and handoff...
In this paper, we consider a two-tier cellular network consisting of a primary macro cell base station (PMBS) which is overlaid by cognitive small cell base stations (CSBSs) to achieve efficient spectrum utilization. The deployment of two-tier cellular networks can provide higher capacity for the system but also causes cross-tier, intra-tier, and inter-tier interference within the cellular networks...
The traditional MAC protocol of 802.11 detects the loss of a packet and declares it a collision only after the transmission of the entire packet is completed. The early detection of a packet loss can reduce the time spent in collision and as a result improve the overall throughput. This paper presents an analytical performance analysis of the early collision detection for WiFi Direct networks. To...
This paper considers an orthogonal frequency division multiplexing system where the Effective Exponential SNR Mapping (EESM) is applied. We first present an approximate model in which the subcarriers grouped into one block are assumed to have the same channel coefficient and, subcarriers in different blocks have independent and identically distributed channel coefficients. Then, we present an algorithm...
Lattice codes used under the Compute-and-Forward paradigm suggest an alternative strategy for the standard Gaussian multiple-access channel (MAC). It has been proven that decoding an integer linear combination of the transmitted codewords enables higher data rates compared to decoding the messages individually. Recent work of Gasptar et al. proposed a new multiple access channel technique that they...
Dynamic Adaptive Streaming over HTTP (DASH) is a predominant technology for delivering video in wired and wireless networks. With DASH, clients can adaptively select the quality (bitrate) of the downloaded video. To improve Quality of Experience (QoE), a recently standardized framework, called Server and Network Assisted DASH (SAND), allows the client and the server to exchange control information...
More email is opened on mobile devices today than on other platforms [1]. At the same time, enterprises are constantly investing in approaches to improve employee productivity. In this paper, we consider the problem of automated information suggestions to assist in reply construction. The basic premise of the work is that a significant portion of the information content of a reply is likely to be...
Various large-scale failures and attacks (e.g., natural disasters, high-altitude electromagnetic pulses (HEMPs), weapons of mass destruction (WMDs), etc.) can instigate initial failures of critical network components (e.g., router, generator) in a cyber-physical infrastructure. In addition, the intra-dependency among various components inside a communication network and the inter-dependency with supporting...
Edge computing, which is a fundamental component of emerging 5G architectures, involves onloading or offloading multiple virtual network functions from mobile devices to an edge network substrate. In this paper, we present a model for the complete edge function onloading problem, which consists of three main phases: (1) Cyber foraging, which involves discovery of resources monitoring the state of...
The rapid increase of connected devices and the major advances in information and communication technologies have led to great emergence in the Internet of Things (IoT). IoT devices require software adaptation as they are in continuous transition. Multi-agent based solutions offer adaptable composition for IoT systems. Mobile agents can also be used to enable interoperability and global intelligence...
The ever-growing population of smartphone» connected to mobile networks is changing the cellular traffic ecosystem. The traffic volumes and patterns generated by smartphone apps pose complex challenges to cellular network operators, particularly in terms of detection and diagnosis of network anomalies caused by specific apps. The high-dimensionality of network data provided by current network monitoring...
With the spread of social networks and mobile applications (apps), the amount of sensitive information shared across Internet increased considerably. Although the majority of this information is encrypted, many apps still transmit sensitive data in plain text, e.g., using HTTP (HyperText Transfer Protocol). Seemingly trivial information, if collected together, can leak out important data about a user...
Pervasive networks formed spontaneously by wireless mobile devices capable of ad hoc communication make it possible to get services from these devices, and to compose them dynamically so as to provide people with new and more sophisticated application services. Discovering, invoking and composing services in such networks are challenging tasks, due to the numerous and unpredictable connectivity disruptions...
Wireless Body Sensor Networks (WBSNs) are a low-cost solution allowing remote patient monitoring and continuous health assessment, thus reducing healthcare expenditure. In such networks, sensor nodes periodically collect vital signs and send them to the coordinator for fusion. However, sensor nodes have limited energy and processing resources and transmission is the most power-hungry task. In this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.