The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Smart home user usually controls smart devices through smart application, which is managed by user's account. Thus, compromised account is possible and countermeasure to such attack can help protect both devices and data pertaining to them. In this paper, we propose a security countermeasure in case of compromised account in smart home system by introducing another layer of access control beyond the...
In less than a decade, mobile apps became an integral part of our lives. In several situations it is important to provide assurance that a mobile app is authentic, i.e., that it is indeed the app produced by a certain company. However, this is challenging, as such apps can be repackaged, the user malicious, or the app tampered with by an attacker. This paper presents the design of TRUAPP, a software...
Machine Type Communication (MTC) is a key component of future 5G networks, and its realization is now possible due to the advances in technology and the market drivers. Several challenges however exist which hinder the realization of MTC, among which signaling overhead is considered the prominent challenge, particularly due to the massive number of devices in MTC networks. In this work, we consider...
The traditional MAC protocol of 802.11 detects the loss of a packet and declares it a collision only after the transmission of the entire packet is completed. The early detection of a packet loss can reduce the time spent in collision and as a result improve the overall throughput. This paper presents an analytical performance analysis of the early collision detection for WiFi Direct networks. To...
This paper addresses the problem of single-cell point-to-multipoint communications. We consider a base station that needs to transmit a common information to a group of users. We propose a layered Wyner-Ziv coding (WZC) scheme based on nested lattice quantization. In our scheme, we use the base layer generated by a standard coder as the decoders side information. Then, WZC is performed for quality...
We propose novel resource allocation algorithms that have the objective of finding a good tradeoff between resource reuse and interference avoidance in wireless networks. To this end, we first study properties of functions that relate the resource budget available to network elements to the optimal utility and to the optimal resource efficiency obtained by solving max-min utility optimization problems...
In this work, the advantages of coupling biomedical signal compressors with clinical feature-based distortion measures are demonstrated. Such a coupling allow biomedical signal compressors to self-establish hard limits with regards to choices surrounding compression ratios, or ‘quality settings’, a compressor can safely choose from to guarantee that features of clinical significance are protected...
This paper considers an orthogonal frequency division multiplexing system where the Effective Exponential SNR Mapping (EESM) is applied. We first present an approximate model in which the subcarriers grouped into one block are assumed to have the same channel coefficient and, subcarriers in different blocks have independent and identically distributed channel coefficients. Then, we present an algorithm...
Due to the rapid growth in scale and complexity of information networks, self-organizing systems have been focused on for realizing new network control architectures that have high scalability, adaptability, and robustness. However, in self-organizing systems, the uncertainty (incompleteness, ambiguity, and dynamicity) of information observable for components in the system can lead to the slow adaptation...
There has been renewed attention given to High Speed Railways (HSR) in the US, in terms of adapting more speed, reliability, increasing passenger capacity and providing passenger centric services. Any future Train-To-Ground (T2G) communication system therefore has to embrace reliable signaling and control-specific needs of HSR, while also catering towards the high performance networking demands of...
Due to the exponential advancements in mobile and IoT device capabilities, we are currently witnessing a resurrection in the domains of ubiquitous and pervasive systems. These systems and devices heavily rely on efficient wireless communication as an enabler of single and multi-hop wireless data transfers. Awareness of the practical performance capabilities and limitations of existing wireless technologies...
This paper considers the layered transmission between the source and the destination over two relays using super-position coding (SC). In this two-hop decode-and-forward (DF) relaying system, because of the network topology, the receiver continuously decodes only the base layer of the direct transmission from the source; the enhancement layer is decoded with a delay based on the transmission from...
The expansion of Internet of Things (IoT) and the evolution in communication technologies have enabled homes, cars even whole cities to be network connected. However, during an emergency incident, IoT devices have not been used to trigger emergency calls directly to healthcare providers mainly due to their constrained capabilities and lack of support session-oriented communications. Moreover, emergency...
Information-Centric Networking (ICN) introduces a paradigm shift from a host centric communication model for Future Internet architectures. It supports the retrieval of a particular content regardless of the physical location of the content. Emergency network in a disaster scenario or disruptive network presents a significant challenge to the ICN deployment. In this paper, we present a Content dIstribution...
On the financial side, a key factor for the success of a smart-city initiative is the low cost of the sensors. On the technical side, the units need to be flexible enough to cover different roles, and to be reconfigurable for a distinct target. The capability to interact with an already deployed infrastructure, like a preexistent web-server, is a favorable feature from both the financial and technical...
Buildings represent 40% of total primary energy use in the U.S., and researchers have recognized the necessity of making office spaces more energy efficient. To reduce energy consumption, it is important to take into account buildings occupants' behavior into account. The difference between simulated, estimated and real power consumption in buildings reflects the need to search for more accurate ways...
Notifications can be relevant but they can also decrease productivity when delivered at the wrong point in time. Smartphones are increasingly capable of detecting relevant context information with the goal to decrease the number of these badly timed interruptions. Accordingly, research on context-aware notification management systems (CNMSs) on mobile devices has received increasing attention recently,...
Currently, 4G mobile communication systems are supported by the 3GPP standard. In view of the significant increase in mobile data traffic, it is necessary to characterize it to improve the performance of current wireless networks. Indeed, video transmission and video streaming are fundamental assets for the upcoming smart cities and urban environments. Due to the high costs of deploying a real LTE...
The security of Cyber Physical Systems is a key factor since these architectures are being applied in many critical scenarios, such as power or water plants, hospitals, etc. In the state of the art, several approaches have been proposed to deal with the possible attacks that could be inferred to the Cyber Physical Systems. This contribution proposes a method for counter fighting the injection of tampered...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.