The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Duty-cycling schemes allow devices to dynamically adjust their active period to conserve energy. On the other hand, synchronization schemes allow multiple coordinators to schedule their transmissions in order to prevent the overlapping of superframe schedules. In this paper, we analyze the impact of a synchronization mechanism on duty-cycling schemes in an IEEE 802.15.4 cluster tree network. We show...
The IEEE 802.15.4 standard does not allow to make dynamic adjustments to the inactive portion of the superframe, thus affecting the duty cycles of the coordinator and all the devices attached to it. Prior works in this direction are either based on superframe occupation ratio or buffer occupancy/queue length of the transmitting nodes. In this paper, we present the respective limitations of both these...
Fog computing paradigm extends the storage, networking, and computing facilities of the cloud computing toward the edge of the networks while offloading the cloud data centers and reducing service latency to the end users. However, the characteristics of fog computing arise new security and privacy challenges. The existing security and privacy measurements for cloud computing cannot be directly applied...
The distributed storage system maintains the data at multiple nodes in the network to provide faster access to data. In case of failure of one node the data is made available to the users from other nodes and the lost data can be recovered from the surviving nodes. Network coding plays an important role in managing the distributed data. Various coding mechanism like Replication, Erasure Coding, Local...
Wireless sensor nodes are prone to frequent failures due to battery exhaustion and other external events, resulting in coverage and communication holes in the network. It is important to detect such holes and network boundaries. In this paper, we propose a distributed boundary detection algorithm that relies on local connectivity information to identify holes and boundaries of the network. The proposed...
The IEEE 802.15.4 standard provides a synchronization mechanism for devices connected in a star network topology using beacons. The lack of it in peer-to-peer network topology restricts its use to non-beacon mode. Addressing this issue, few protocols have been proposed based on either centralized or distributed approach. Irrespective of the approach, the three major criterion to evaluate different...
ZigBee is a networking standard for low power, low data-rate, resource constrained networks. It provides network and upper layer services for LR-WPAN, cyber physical systems, industrial sensor networks, smart grids, home automations, etc. The routing layer uses the tree based routing protocol wherein only parent-child relationship are considered for routing, ignoring neighbor nodes. This results in...
IEEE 802.15.4 standard is used for low data rate, low power and short-range radio frequency transmission devices to form a personal area network (PAN). As part of the standard, the MAC sublayer provides security services to protect MAC frames while recommends the implementation of security features at higher layers of protocol stack. This work presents a denial of service attack exploiting the PAN...
RPL is one of the candidate routing protocol designed for low power and lossy networks, where devices are constrained in memory, and energy (battery power) and limited processing. Devices in such a network operate at low data rates and experience packet losses. In addition, these devices are also susceptible to several security attacks due to open environment in which they operate. In this paper,...
Cloud Providers use the concept of Virtualization so that the requests of end users are fulfilled in minimum possible time. The host machines in the Data centers are spliced into multiple Virtual Machines which are allocated to the end users. Since the end user requests are dynamic in nature, the allocation of Virtual Machines to end user applications imposes several challenges to the Cloud Providers...
Users that store their data in cloud storage systems want their data to be stored reliably and available every time. Even in case of failures the cloud must be able to serve its clients efficiently. For this purpose some mechanism is required that will provide easy and fast recovery of failed nodes. Many coding methods have been used in different versions of Hadoop's HDFS, HDFS-RAID and XORBAS for...
Network coding is used in peer-to-peer storage systems, archival storage, wireless networks, satellite communication, video conferencing etc. Storage system stores data at different locations. For the data to be available, durable and reliable, it must be able to recover from failures efficiently. Different approaches applied for recovery in storage systems are examined and evaluated in this paper...
Universal-filtered multi-carrier (UFMC) technique is considered as a potential candidate for future communication systems due to its robustness against inter-carrier interference (ICI), suitability for non-contiguous fragmented available spectrum resources and low latency scenario in 5G network. In this paper, we present a novel pulse shaping approach in UFMC to reduce the spectral leakage into nearby...
Abstract-Universal-filtered multi-carrier (UFMC) technique is considered as a potential candidate for future communication systems due to its robustness against inter-carrier interference (ICI), suitability for non-contiguous fragmented available spectrum resources and low latency scenario in 5G network. In this work, we present a novel pulse shaping approach in UFMC to reduce the spectral leakage...
Non-contiguous Carrier Interferometry (NC-CI) signature waveforms have been proposed for Dynamic Spectrum Access (DSA) and Cognitive Radio (CR) system in the literature. Walsh-Hadamard (WH) codes cannot ensure orthogonality for non-contiguous carrier allocation, when the number of non-contiguous carrier is not a multiple of 4. In literature, NC-CI and binary orthogonal codes of any code length are...
Future wireless communication systems beyond 2020 will demand diverse requirements on system design that supports a wide range of data rates in overcrowded networks. This paper presents a physical (PHY)-layer system design for ultra-dense network (UDN) with multirate transmission. This proposed scheme transmits user data over highly fragmented spectrum which implies efficient spectrum utilization...
The existing Peer link establishment protocol documented in IEEE 802.11s standard is not secure and vulnerable against relay and wormhole attacks. To address this issue, an efficient technique using location information, is proposed in this work. Security of the proposed technique is analysed using Simulation Paradigm.
Routing metric plays a vital role in path selection process. A variety of routing metrics have been proposed to enhance the performance of routing protocols. Considering the forwarding behavior of neighbor node in the design of a routing metric would address the most generic packet dropping attacks in wireless mesh network (WMN). The existing routing metrics to address packet dropping attack in WMN...
Multicast is a communication technique that allows a source to transmit data to a set of recipients in an efficient manner. Therefore, the primary objective of a multicast routing protocol would be to minimize number of transmissions to conserve bandwidth. The problem of computing multicast trees with minimal bandwidth consumption is similar to Steiner tree problem and has shown to be NP-complete...
Wormhole attack is one of the most severe security threats in wireless mesh network that can disrupt majority of routing communications, when strategically placed. At the same time, most of the existing wormhole defence mechanisms are not secure against wormhole attacks that are launched in participation mode. In this paper, we propose WRSR, a wormhole-resistant secure routing algorithm that detects...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.