The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As information systems become ubiquitous, Intrusion Detection Systems (IDSs) have assumed increasing importance. As a result, substantial amount of research efforts have been devoted to developing various intrusion detection algorithms. However, there is still no single detection algorithm that can catch all possible attacks. On the other hand, it is infeasible for practical IDSs to run all the detection...
With rapid growth of LTE network and Voice-over-LTE(VoLTE), detecting and preventing security threats like Denial of Service attack becomes a necessary and urgent requirement. VoLTE is an voice solution based on Internet Protocol and 4G LTE technology, at the same time exposing many vulnerabilities when using packet-switched network. There are many heavy weighted detection systems using content analysis,...
Heterogeneous cloud small cell network (HCSNet) with energy harvesting is a promising technique in the next generation mobile communications. However, the cross- tier and co-tier co-channel interference can be severe due to the spectrum sharing in inter-tier and intra- tier of HCSNet. This paper investigates the problem of power allocation and subchannel assignment with the consideration of cross-tier/co-tier...
Broadband wireless communication is of critical importance during public safety scenarios as it facilitates situational awareness capabilities for first responders and victims. In this paper, the use of LTE-Unlicensed (LTE-U) technology for unmanned aerial base stations (UABSs) is investigated as an effective approach to enhance the achievable broadband throughput during emergency situations...
One of the major challenges in a wireless sensor network (WSN) is to extend the network's lifetime by minimizing the energy consumption. One of the ways to do so is to reduce network congestion as it increases delays and introduces additional packet collisions- thus, adversely affecting network performance. In this paper, we analyze this issue in routing and take an evolutionary game theoretic approach...
Cloudlet is a new paradigm in mobile cloud computing to provide resources to nearby mobile users via one-hop wireless connections. In this study, we leverage the social tie structure among mobile users to achieve mutual-beneficial computation offloading decision making and hence enhance the system-wide performance.Drawing on a social group utility maximization (SGUM) framework, we cast users' decision...
The article considers the joint optimization of artificial noise (AN) and information signal precoders in a MIMO wiretap interference network where the transmission of each user may be overheard by several MIMO-capable eavesdroppers. We use the theory of non-cooperative games to propose a distributed framework to optimize the covariance matrices of the information signal and AN at each link. To tackle...
Deployment of femtocells have emerged as a promising technique to address the need for the exponentially increasing mobile traffic demand. They can also improve the capacity and coverage for the indoor wireless users. However, the cross-tier interference in such heterogeneous networks between the femtocells and the macrocells is a design challenge which should be answered before such deployment. In...
Vehicular cloud, which is constituted by gathering the under-utilized on-board capabilities on the road, has received considerable attention in recent years. In this paper, we propose a novel secure and privacy-preserving incentive mechanism in vehicular cloud, which employs the Stackelberg Game to model the interaction between the leader and follower vehicles. With the proposed incentive mechanism,...
Content dissemination, in particular small-volume popular content dissemination, represents a killer application of vehicular networks, which is also fundamental to the delivery of advanced infotainment applications, such as vehicular social networks, road traffic alerts, etc. The content dissemination in vehicular networks relies on moving vehicles to relay and propagate contents. Due to challenges...
Demand response is widely employed by today's data centers to response to the increasing of electricity cost. To incentivize users of data centers participate in the demand response programs, i.e., breaking the split incentive hurdle, some prior researches proposed market-based mechanisms such as dynamic pricing and static monetary rewards. However, these mechanisms are either intrusive or unfair...
In this paper, an underlay based cognitive radio network (CRN) consisting of a secondary base station (SBS), a secondary receiver (SR), an energy harvesting node (EHN), and a primary transmitter-receiver (PT-PR) pair, is considered. The EHN is assumed to have a power splitter (PS) at the receiver to decode information and harvest energy simultaneously from the SBS transmission, thus reducing the secrecy...
With the explosive development of social networks, users' behaviors are prone to be socially connected. Social Network Operator (SNO) can effectively collect communication data which reflects users' social behaviors and construct a social graph which precisely characterize relationship among users. Users who exert online influence on their friends can potentially affect their friends' demand for wireless...
With increasing mobile data services in the wireless communication networks, the LTE unlicensed is put forward as an effective way to offload the crowded traffic in the licensed spectrum. However, when there are multiple wireless cellular operators (WCOs) sharing the common unlicensed spectrum together, how to manage the competitions among all WCOs while guaranteeing the performance of the Wi-Fi networks...
In this paper, the problem of optimized beam alignment for wearable device-to-device (D2D) communications over millimeter wave (mmW) frequencies is studied. In particular, a noncooperative game is formulated between wearable communication pairs that engage in D2D communications. In this game, wearable devices acting as transmitters autonomously select the directions of their beams so as to maximize...
We study optimal monitor placement for intrusion detection in networks with persistent attackers. The problem is modeled as a stochastic game in which the attacker attempts to control targets by delivering malicious packets while the defender tries to detect such attempts. The state of the game is determined by the target end-systems in the network, each of which can be in either a healthy or a compromised...
In this paper, we study the power allocation problem for the downlink transmission in a set of closed-access femtocells which underlay a number of macrocells. We introduce a mutli-step pricing mechanism for the macrocells to control the cross- tier interference by femtocell transmissions without explicit coordination. We model the cross- tier joint power allocation process in the heterogeneous network...
We study the impact of assortativity or network mixing on interdependent security. We employ a population game model to capture the interaction among many agents when agents are strategic and have various security measures they can choose to defend themselves. We model the interdependence in security among agents using a dependence network. The overall (local) network security seen by agents is measured...
Cognitive radio is an optimistic technology to implement the concept of dynamic spectrum access and provide a flexible way to share the spectrum among the primary and secondary users. In this paper, a game theoretic-based model is presented using the concept of Nash Equilibrium for spectrum sharing. In this model, interference and number of radios on each link are considered as parameters for designing...
The study item: "Feasibility Study on LTE-based V2X Services", approved at 3GPP TSG RAN #68, has aroused the interest in the study of LTE assisted vehicle-to-vehicle (V2V) and vehicle-to- infrastructure (V2I) communications in the networks of connected vehicles. By deploying the direct device-to-device (D2D) technology of traditional cellular networks into the V2X (including both V2V and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.