The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
When deploying wireless sensor networks (WSNs) in practical applications, access control systems can limit access to sensitive information only to trusted entities and provide a capability to resist against various attacks from malicious nodes. However, due to the characteristics of highly distributed and resource-constrained, applying conventional access control models to WSNs is significantly challenging...
In a smart grid system, the metering data collected by smart meters (SMs) and transferred via an Advanced Metering Infrastructure to the utility for billing purposes, and to the demand-response system to achieve cost effective resource allocation. The collected data at the SMs are sent to aggregators (AGRs), which in turn forward these data to a higher layer data collection system using secured communications...
Smart Grid (SG) uses communication technology to gather information about the actual and planned power usage in order to enable efficient power provisioning and consumption. Wireless multi-hop communications are used for exchanging data and control messages between smart meters and the utility. With the advent of cybercrimes, there is a growing concern on privacy of the clients. We argue that any...
Cumulative distribution function (CDF)-based scheduling is known as an efficient scheduling method that can assign different time fractions for user access or, equivalently, satisfy different channel access ratio requirements of users in cellular downlink while exploiting multi-user diversity. In this paper, we propose CDF-FR, a feedback reduction technique for CDF-based scheduling that reduces feedback...
With the rapid growth in the deployment of electronic control units within vehicle, we will witness a tremendous growth in weight, volume, and complexity of the wiring harnesses in vehicles. The use of power lines inside vehicles as a transmission medium, so-called power line communication, is a promising alternative to overcome these issues. In this paper, we present a multi-carrier contention scheme...
In this paper, an ultra-low-power system for wireless monitoring of inductively coupled biomedical implants is presented. The system is fully integrated and composed of custom rectifier, alignment and monitoring circuits with enhanced performance. The proposed system is described in the context of a smart-stent system that monitors the re-narrowing of blood vessels at the smart-stent site. The building...
This paper considers an asynchronous distributed power allocation scheme for sum-rate-maximization under cognitive Gaussian multiple access channels (GMACs), where primary users and secondary users may communicate under mutual interference with the Gaussian noise. Formulating the problem as a standard nonconvex quadratically constrained quadratic problem (QCQP) provides a simple distributed method...
The high level of compression achieved by HEVC raises a question regarding its error-resilience performance extremely compressed data over an imperfect medium. In this paper, we study the behavior of this newly developed video coding standard over diverse networking scenarios. It is shown that HEVC is less error resilient compared to H.264/AVC, especially in the scenes with high amount of motion,...
Mobile cloud-based video gaming (MCVG) is an emerging trend in moving the online entertainment industry into the cloud era. In MCVG, the game engines are hosted in the cloud, and the rendered gaming videos are transmitted over wireless networks to the mobile devices. In reverse, game players' interactions on screens are sent to the cloud server over the same networks. How to compress and transmit...
Distributed antenna systems (DAS) have been studied extensively to improve spectral efficiency and extend coverage. Different from the previous studies that focused mostly on the enhancement of downlink or uplink performance through cooperation of distributed antennas, this paper proposes and investigates a novel communication configuration in which a fiber-connected DAS is employed as a distributed...
Utilization of radio frequency identification (RFID) tags to localize objects in real time requires the collection of the identities (IDs) of the tags within a short time. This paper presents a novel orthogonal group identification (Ogrid) method that addresses the above requirement. When queried, multiple tags with mutually orthogonal IDs respond, such that these tag IDs can be separated at the reader...
Transmission Control Protocol (TCP) is the most widely used protocol for end-to-end data transmissions over inter-networks. However, the congestion control algorithm of TCP was not created to match the special characteristics of satellite links, resulting in a drastically performance degradation. The employment of TCP split connections coupled with link level retransmissions and satellite link tailored...
Most recent analyses on IEEE802.11e quality of service (QoS)-aware enhanced distributed coordination function (EDCA) require a large degree of complexity, making it difficult to apply them to a wide range of parameter settings for the evaluation of service differentiation mechanisms supported in EDCA, including the Contention Window (CW) and Arbitration Inter-Frame Space (AIFS) mechanisms. In this...
Many applications in vehicular networks are context-aware in that the observations of sensing nodes, potentially vehicles, at a target location should be made available to the requesting node possibly at a different location. In order to provision such applications, two phases of packet routing between the requesting node and the target location and packet dissemination within the target location...
TDD/TDMA based secondary network with cognitive capability is considered here. Primary network is WiFi based where the secondary network operates. DCF protocol has been followed by the users of WiFi network. Exact operating mechanism of DCF protocol is complex. Given this complexity, it is difficult for a secondary user to fully exploit the spectrum hole unused by WiFi users. We propose a novel opportunistic...
We consider the problem of energy consumption in sharing a viral file between peers over a wireless community network (e.g., students in campus). Wireless community networks such as Wireless Mesh Networks (WMNs) have been accepted as a new communication approach that enables users to share the network resources and reduce the cost of the Internet access. The common paradigm for sharing content between...
Due to the extensive use of wireless technologies, security is one of the most important and challenging issues in smart grid networks. To secure data communications, strong authentication and key management mechanisms are needed. In this paper, we propose a mutual authentication scheme and key management protocol tailored for Home Area Network (HAN) with low overhead and enhanced robustness. Using...
In this paper, we consider smart grid system demands on remote controlling a smart appliance from up to the central controller layer, in a confidential fashion and immune from any in-between principles' intrusion. For instance, we need to remotely turn off a low-priority high-demand appliance in case of crisis and emergency, or manage a plug-in electric vehicles recharging. Hence a Home Area Network...
In a wireless mesh network, an efficient utilization of multiple radios with multiple channels involves the assignment of channels to radios/links. This becomes an optimization problem for which various objectives can be defined with various conflicting constraints and requirements. We present a novel channel assignment strategy based on predicted upper-bound and lower-bound of interference associated...
Relaying is a major technique to increase network lifetime in wireless sensor networks (WSNs) and body area networks (BANs). The results of relaying studies highly depend on power consumption model of relay's transmitter and receiver radio, channel and mobility models. In this work, we study the effect of relaying with 2.4GHz IEEE802.15.4 modules on network lifetime. We analytically derive the energy...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.