The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cooperative spectrum sensing is an efficient solution to mitigate the primary hidden terminal problem through the involvement of the sensing result for cooperative users. Clustering is introduced to tackle the degradation in the performance of cooperative spectrum sensing caused by fading and shadowing of reporting channel, and also to reduce the control channel overhead when the number of cooperative...
Dynamic spectrum access in the form of cognitive radio (CR) has gained traction in wireless sensor networks (WSN) because of a) scarcity caused by the proliferation of wireless devices and service and b) it provides spectrum efficient communication for the resource constrained WSNs. However, proper means have to be devised to satisfy the requirements of both WSNs and CRs and to enjoy the benefits...
In cloud data center, shared storage with good management is a main structure used for the storage of virtual machines (VM). In this paper, we proposed Hybrid VM storage (HVSTO), a privacy preserving shared storage system designed for the virtual machine storage in large-scale cloud data center. Unlike traditional shared storage, HVSTO adopts a distributed structure to preserve privacy of virtual...
The proliferation of cloud computing over the past several years has led to a variety of new use cases and enabling technologies for enterprise and consumer applications. Increased reliance on cloud-based platforms has also necessitated an increased emphasis on securing the services and data hosted within those platforms. From a security standpoint, an advantage of cloud platforms over traditional...
Multi-factor authentication (MFA) is an approach to user validation that requires the presentation of two or more authentication factors. Given the popularity of cloud systems, MFA systems become vital in authenticating users. However, MFA approaches are highly intrusive and expose users' sensitive information to untrusted cloud servers that can keep physically identifying elements of users, long...
Targeted advertising is a growing area of interest in both business and research community. In mobile communications, related research works focus on the collection of user's personal information by the mobile apps, protection against such data collection, and the implications of additional traffic generated by the ads on the mobile device resource utilization. In this work, we present a novel analysis...
We propose Authentication and Key Agreement (AKA) for Machine Type Communications (MTC) in LTE-Advanced. This protocol is based on an idea of grouping devices so that it would reduce signaling congestion in the access network and overload on the single authentication server. We verified that this protocol is designed to be secure against many attacks by using a software verification tool. Furthermore,...
With the number increasing of applications and services that are available on mobile devices, mobile cloud computing has drawn a substantial amount of attention by academia and industry in the past several years. When facing the most exciting machine learning applications such as deep learning, the computing requirement is intensive. For the purpose of improving energy efficiency of mobile device...
As a key enabler of Internet of things, cellular network based Machine-to-Machine (M2M) communications have been growing rapidly in recent years, being used in a wide range of services such as security, metering, health, remote control, tracking, and so on. A critical issue in M2M communications is the energy efficiency as typically the machine devices are powered by batteries of low capacity and...
Mobility management in small cell networks is of utmost importance, and is currently under study in 3GPP Release-12. In this article, we model and analyze the outbound handover failure probability in small cell networks, in which a given user crosses its serving cell coverage border before his time-to-trigger elapses, without connecting to his target base station. Using tools from stochastic geometry,...
This paper proposes energy and cross-layer aware resource allocation techniques that allow dynamic spectrum access users, by means of learning algorithms, to locate and exploit unused spectrum opportunities effectively. Specifically, we design private objective functions for spectrum users with multiple channel access and adaptive power allocation capabilities. We also propose a simple, two-phase...
In this paper we investigate the fundamental performance limits of the cooperative sensing using energy detection by considering the unlimited number of sensing nodes. Although a lot of cognitive radio research so far proposed various uses of energy detection because of its simplicity, the performance limits of energy detection have not been well understood when a large number of sensing nodes exist...
Self-certifying names provide the property that any entity in a distributed system can verify the binding between a corresponding public key and the self-certifying name without relying on a trusted third party. However, self-certifying names lack a binding with a corresponding real-world identity. In this paper, we present a concrete mechanism for using a Web-of-Trust in conjunction with self-certifying...
In mobile cloud computing, mobile devices seek to minimize computation time and/or energy consumption based on task related or user defined constraints. In earlier work [1], we proposed to minimize the total energy consumption across all the mobile devices in a cyber foraging system using a scheduler that runs in a centralized broker node, in situations where a large number of mobile devices could...
In the immediate aftermath of a natural disaster, network infrastructure is likely to have suffered severe damages that challenge normal communications. In addition to that, traffic substantially increases as a result of people attempting to get in touch with friends, relatives or the rescue teams. To address such requirements of a challenged network, we propose a communication framework based on...
In this paper we apply the Named Data Networking [1], a newly proposed Internet architecture, to networking vehicles on the run. Our initial design, dubbed V-NDN, illustrates NDN's promising potential in providing a unifying architecture that enables networking among all computing devices independent from whether they are connected through wired infrastructure, ad hoc, or intermittent DTN. This paper...
Information-centric networks have recently been drawing increasing attention in academia as well as in industry. Information and content retrieval is a critical service for mobile ad-hoc networks. It relies on other resources and tools, such as internal storage, content searching and sharing, delay-tolerant delivery, etc. Previous studies have shown that social networking can assist delay-tolerant...
To save energy, physical machines (servers) in cloud data centers are partitioned in different pools, depending on whether they are kept on at all times and/or whether they have virtual machines instantiated. Partitioning (pooling) of servers affects the power consumption of the data center but also the performance and responsiveness to user requests. In this paper we examine the behavior of pool...
We consider the scenario where a mobile device requires assistance from nearby devices to forward its computational tasks to a cloud server. We incentivize cooperation by allowing helper devices to conserve computational energy by offloading their own tasks to the source device's cloud, as compensation for the communication energy lost during task forwarding. We formulate an optimization problem with...
Caching decreases content access time by keeping contents closer to the clients. In this paper we show that network coding chunks of different contents and storing them in cache, can be beneficial. Recent research considers caching network coded chunks of same content, but not different contents. This paper proposes three different methods, IP, layered-IP and Greedy algorithm, with different performance...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.