The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The age of information is a measure of the freshness of continually updated information, which has been studied theoretically for a variety of queueing models. We conduct an experimental evaluation of the age of information in various emulated network settings to see how well the queue models approximate a network for the purpose of age. We use CORE and EMANE to deploy a one-dimensional multi-hop...
HF ionospherical channels are very challenging due to their time and frequency selective, and highly varying natures. Furthermore, they offer only limited data rates, which led generations of engineers to limit the signalization information and to reduce the number of turnarounds to preserve a maximum throughput for useful data. However, new wideband modems [1] [2] have recently been proposed, that...
Tactical cloudlets are forward-deployed, discoverable, virtual-machine-based servers that can be hosted on vehicles or other platforms to provide a computation offload and data staging infrastructure for mobile devices in the field. Because of the mobility of cloudlets in the field, as well as dynamic missions, a mobile user of a cloudlet might need to migrate active capabilities (computation and...
Software Defined Networking (SDN) is rapidly gaining acceptance and use in terrestrial networks but little research has been done to apply it to aerial networks. This paper describes an investigation into five open-source controllers using a specific set of criteria based on the characteristics of these networks. A preliminary qualitative investigation compares the controllers based on their state...
In this paper, we propose novel user clustering schemes for downlink non-orthogonal multiple access (NOMA) system, where an N-antenna base station (BS) selects and serves 2N users from K single antenna user equipments (UEs) (K ≥ 2N and K is even). In particular, we propose a signal difference and alignment (SDA) framework to achieve fair and spectral efficient user clustering for NOMA with flexible...
The generation of pseudorandom number sequences can be achieved in a variety of ways, with the most secure methods generally requiring substantial processing to generate. Other pseudorandom number generation (PRNG) methods accept a compromise between processing power and security by mixing two independent, but less secure, PRNG outputs with each other. This paper presents a generalized mixing method...
Edge windowing is a windowing technique for Orthogonal Frequency Division Multiplexing (OFDM) signals based on the idea of using shorter cyclic prefix (CP) and longer window lengths at the edge subcarriers while keeping the symbol length fixed. In this study, we investigate the performance of OFDM signals with edge windowing under non-linear power amplifier (PA) effects by observing out-of-band (OOB)...
With the growing number of cyberattack incidents, organizations are required to have proactive knowledge on the cybersecurity landscape for efficiently defending their resources. To achieve this, organizations must develop the culture of sharing their threat information with others for effectively assessing the associated risks. However, sharing cybersecurity information is costly for the organizations...
In this paper, a transmission mode selection scheme is proposed for device-to-device (D2D) communications underlay cellular networks, where potential D2D (p-D2D) users reuse the spectrum of uplink cellular users (CUEs). The developed framework is used to analyze and understand how the underlay D2D communication affects the cellular network performance. Unlike most of the previous researchers who only...
The Department of Homeland Security Cyber Security Division (CSD) chose Moving Target Defense as one of the fourteen primary Technical Topic Areas pertinent to securing federal networks and the larger Internet. Moving Target Defense over IPv6 (MT6D) employs an obscuration technique offering keyed access to hosts at a network level without altering existing network infrastructure. This is accomplished...
As the complexity and number of cybersecurity incidents are growing, the traditional security measures are not sufficient to defend against attackers. In this situation, cyber threat intelligence capability substantially improves the detection and prevention of the sophisticated attacks. Cybersecurity information sharing is a key factor of threat intelligence, allowing organizations to detect and...
Unmanned aerial vehicles (UAVs) are widely used in military due to the hostile environment and safety concern. To tackle the challenges on UAV communications, millimeter wave (MMwave) communication has been considered as a potential solution for both security and high throughput capability. However, insufficient research has been carried out for MMwave communications on drone, and no widely recognized...
Mobile ad-hoc networks (MANET) are of particular importance in military communications. With the trend towards higher throughput requirements and spectrum congestion, researchers have looked at using multi-antenna techniques to enable concurrent transmissions within a one-hop MANET. However, the acquisition overhead has been shown to be a problem when dealing with concurrent transmission in MANET...
This work considers the use of obfuscation against a global eavesdropper in a resource-constrained environment. We assume a network where network traffic (queries) is not always present on the network but is stochastic in nature. Even if the traffic is encrypted and the payload of packets are secure, under the threat of a passive adversary, activity over the links might be subjected to traffic analysis...
In a wireless ad hoc multimedia network, how does the Quality of Experience (QoE) of the user affect the level of Situational Awareness (SA)? Is maximum QoE necessary for high SA? In this empirical study, we propose a novel measurement approach to quantify SA based on the QoE of the user. The relationship between QoE and network Quality of Service (QoS) metrics such as delay and packet loss is well...
Energy harvesting motivated networks (EHNets) are rapidly emerging as a major part of ubiquitous computing and communication infrastructure in the presence of Internet-of-Things (IoT). A set of self-sustainable nodes equipped with energy harvesting capabilities can effectively exploit ambient energy and convert it into electric energy, but it is admittedly vulnerable to a Denial-of-Service (DoS) attack...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.