The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The explosively growing demands for mobile traffic services bring both challenges and opportunities to wireless networks. Wireless network virtualization is proposed as the main evolution path toward the forthcoming fifth generation (5G) cellular networks. In this paper, we propose a software defined and virtualized (SDV) wireless network architecture for enabling multi-flow transmission with multiple...
Recent development of wireless communication systems and standards is characterized by constant increase of allocated spectrum resources. Since lower frequency ranges cannot provide sufficient amount of bandwidth, new bands are allocated at higher frequencies, for which operators might resort for deploying more base stations to ensure the same coverage. Connecting increased number of base stations...
Building automation systems were designed in an era when security was not a concern as the systems were closed from outside access. However, multiple benefits can be found in connecting such systems over the Internet and controlling a number of buildings from a single location. Security breaches towards building automation systems are increasing and may cause direct or indirect damages to the target...
In recent times, major cybersecurity breaches and cyber fraud had huge negative impact on victim organisations. The biggest impact made on major areas of business activities. Majority of organisations facing cybersecurity adversity and advanced threats suffers from huge financial and reputation loss. The current security technologies, policies and processes are providing necessary capabilities and...
Keystroke dynamics is one of the authentication mechanisms which uses natural typing pattern of a user for identification. In this work, we introduced Dependence Clustering based approach to user authentication using keystroke dynamics. In addition, we applied a k-NN-based approach that demonstrated strong results. Most of the existing approaches use only genuine users data for training and validation...
Recent development of wireless communication systems and standards is characterized by constant increase of allocated spectrum resources. Since lower frequency ranges cannot provide sufficient amount of bandwidth, new bands are allocated at higher frequencies, for which operators might resort to deploy more base stations to ensure the same coverage. Connecting increased number of base stations to...
With an enormous increase in number of mobile users, mobile threats are also growing rapidly. Mobile malwares can lead to several cybersecurity threats i.e. stealing sensitive information, installing backdoors, ransomware attacks and sending premium SMSs etc. Previous studies have shown that due to the sophistication of threats and tailored techniques to avoid detection, not every antivirus system...
The paper deals with synchronization standards, applications and challenges in the modern packet switched telecommunication networks. In recent years, the number of time-dependent services and systems only increases with the development of such areas as Internet of Things (IoT), industrial Internet, remote automation and robotics, precise positioning etc. In the paper, these emerging applications...
Low power nodes, such as small cells and relays, have been a hot topic in research, standardization, and industry communities, and are typically considered under an umbrella term called heterogeneous networking. In this paper, we look at the problem of finding the optimal ratio between resources allocated for the access and relay links for in-band relays. We present an algorithm that can find the...
This article proposes Soft Dependence Clustering (SDC) algorithm which belongs to the class of spectral clustering methods. On each iteration, SDC performs a hierarchical clustering producing a binary split which greedily maximizes the group dependence score. One of the advantages of SDC is the fact that division of a group into two clusters is done based on the adjustable threshold which has a clear...
The explosively growing demands for mobile traffic service bring both challenges and opportunities to wireless networks, among which, wireless network virtualization is proposed as the main evolution towards 5G. In this paper, we first propose a Software Defined Network (SDN) based wireless virtualization architecture for enabling multi-flow transmission in order to save capital expenses (CapEx) and...
Using a very general formulation of the Internal Model Principle for infinite-dimensional systems it is shown that a robust controller tracking/rejecting signals generated by an infinite-dimensional exosystem can be decomposed into a servocompensator and a stabilizing controller. The servocompensator contains an internal model of the exosystem generating the reference and disturbance signals and the...
Exchanging of Situation Awareness information is extremely important for organizations in order to survive as part of the cyber domain. The situation Awareness is required for decision making and for an early warning of upcoming threats. Situation Awareness and the security information in the cyber domain differ from the kinetic domain. Because of that, Situation Awareness has different requirements...
Nowadays, zero-day Denial-of-Service (DoS) attacks become frighteningly common in high-speed networks due to constantly increasing number of vulnerabilities. Moreover, these attacks become more sophisticated, and, therefore, they are hard to detect before they damage several networks and hosts. Due to these reasons, real-time monitoring, processing and network anomaly detection must be among key features...
In this paper, resource allocation (RA) problem in heterogeneous Software Defined Network (SDN) with infrastructure sharing platform among multiple network service providers (NSPs) is studied. The considered problem is modeled as a reverse combinatorial auction (R-CA) game, which takes competitiveness and fairness of different NSPs into account. The heterogeneous RA associated with personal QoS requirement...
Low power nodes have been a hot topic in research, standardization, and industry communities, which is typically considered under an umbrella term called heterogeneous networking. In this paper, we look at the problem of optimal deployment of low power nodes that could be either small cells connected via the wired backhaul or relays that utilize the same spectrum and the wireless access technology...
In this paper, resource allocation for energy efficiency in heterogeneous Software Defined Network (SDN) with multiple network service providers (NSPs) is studied. The considered problem is modeled as a reverse combinatorial auction game, which takes different quality of service (QoS) requirements into account. The heterogeneous network selection associated with power allocation problem is optimized...
Relay networking is an appealing option for operators to solve coverage issues and to improve performance without a need to deploy more complex macro sites. In this paper we look at several options for re-transmission mechanisms that are already adopted in wireless standards, such as 3GPP LTE-Advanced and IEEE 802.16. In particular, we consider a hop-by-hop HARQ operation without any ARQ on top of...
New physical layer solutions are required for the next generation professional mobile radio (PMR) networks. Filter bank based multi-carrier (FBMC) technique is one of the promising candidates for beyond OFDM 5G wireless communication systems. This paper presents the simulation framework and models necessary for the study of the FBMC-based networks on the system level. PMR-specific 450 MHz frequency...
In this study, we apply an anomaly-based approach to analyze traffic flows transferred over a network to detect the flows related to different types of attacks. Based on the information extracted from network flows a model of normal user behavior is discovered with the help of several clustering techniques. This model is then used to detect anomalies within recent time intervals. Since this approach...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.