The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cyber-physical systems connect the physical world and the information world by sensors and actuators. These sensors are usually small embedded systems which have many limitations on wireless communication, computing and storage. This paper proposes a lightweight coding method for secure and reliable transmission over a wireless communication links in cyber-physical systems. The reliability of transmission...
Nowadays, the Internet of Things (IoT) is receiving more attention in commercial and academic research, especially about its security property. However, current protocols cannot satisfy the requirement of various IoT applications and introduce some problems. There are three typical problems: traditional public key infrastructure (PKI) apply in IoT will incur great overhead, wireless sensor network...
This paper considers user level key performance indicators (KPI) evaluation for LTE network. Traditionally, cell level KPIs are obtained from the signalization data of soft/hard collection. However, the cell level KPIs could not be used to locate the communication problems within a cell. To solve this problem, we propose user level KPI evaluation methods. Two methods are proposed. User identification...
E-voting techniques and systems have not been widely accepted and deployed by society due to various concerns and problems. One particular issue associated with many existing e-voting techniques is the lack of transparency, leading to the failure to deliver voter assurance. In this work, we propose an assurable, transparent, and mutual restraining e-voting protocol that exploits the existing two-party...
Due to the limited resources and intermittent connectivity of Delay-Tolerant Networks (DTNs), it is a challenging task to design an efficient congestion control method to meet the application requirements. In this paper, a new DTN congestion control method called following routing(FR) is proposed. In the method, when the transit node is about to be congested, current node will follow the route of...
The recent penetration of smart mobile devices into the consumer market sets a stage for novel network applications. In particular, we envision a paradigm shift in the commercial advertising model facilitated by the widespread uses of these devices: advertisements circulate in a word-of-mouth fashion among device users and reach potential customers based on the users' knowledge about their contacts...
A new way to design and realize a net-based photoelectronic theodolite remote control system is proposed. Analyzes the reliability, net delay and net security problems of this system and uses buffer technology to ensure the reliability, uses password authentication technology to solve the security problem, uses multicast technology to improve the efficiency of network transmission, uses data extrapolation...
A novel cluster-head selection algorithm using the minimum mean distance between sensor nodes as a selection parameter for wireless sensor networks is presented. The proposed algorithm takes 1.65 times longer to reach the point where 50% sensor nodes remain alive, and achieves 1.33 times longer overall network lifetime than the low energy adaptive clustering hierarchy protocol (LEACH) while maintaining...
Sensor networks are highly constrained by limited energy. It is reasonable to take energy efficient protocols to prolong the network lifetime, because communications consume the most energy. In addition, the influx of traffic is a main characteristic that distinguish sensor networks from others e.g. Internet and Manet. Therefore, optimal traffic distribution will maximize the lifetime of sensor networks...
Energy is one of the most important resources in wireless sensor networks, and data transmission is a main energy consumers. So energy efficient communication protocols are very important to sensor networks. It is an essential issue in the research on energy efficient protocols that how long a sensor network can survive to the best advantage. We formalize the lifetime-maximizing problem to a multi-source...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.