The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays, most mobile devices are equipped with multiple wireless interfaces, causing an emerging research interest in device to device (D2D) communication: the idea behind the D2D paradigm is to exploit the proper interface to directly communicate with another user, without traversing any network infrastructure. A first issue related to this paradigm is the need for a coordinator, called controller,...
The use of secure HTTP calls is a first and critical step toward securing the Android application data when the app interacts with the Internet. However, one of the major causes for the unencrypted communication is app developer's errors or ignorance. Could the paradigm of literally repetitive and ineffective emphasis shift towards emphasis as a mechanism? This paper introduces emphaSSL, a simple,...
With the emergence of 3D mobile and VR devices, mobile 3D video services are becoming increasingly important for video service providers, such as Youtube and Netflix, while multi-view 3D videos have the potential to inspire a variety of innovative applications. However, enabling multi- view 3D video services may overwhelm WiFi networks when every view of a video are multicasted. In this paper, therefore,...
NEtwork MObility (NEMO) is a host-based mobility management protocol, which efficiently manages Internet connectivity of multiple nodes on the move. Proxy Mobile IPv6 (PMIPv6), a network-based mobility management protocol, tries to offload low-power mobile devices though managing mobility signaling by the infrastructure devices. To support network mobility in PMIPv6-domain, several schemes have been...
In this work we investigate the effectiveness of continuous-variable (CV) entangled states, transferred through high-loss atmospheric channels, as a means of viable quantum key distribution (QKD) between terrestrial stations and low-Earth orbit (LEO) satellites. In particular, we investigate the role played by the Gaussian CV states as compared to non-Gaussian states. We find that beam-wandering induced...
With the development of intelligent transport systems (ITS) and vehicular ad hoc network (VANET), vehicular cloud computing (VCC) has been proposed to bring essential and potential benefits, such as improving traffic safety and offering computational services to road users. To make such computational services reliable and secure, the computation results from the vehicular cloud (VC) should be verifiable...
Support of data communication during disaster management operations is traditionally achieved by means of Internet Protocol (IP)-based networks, which however show some limitation in terms of mobility support and resilience to link disruption. A new promising networking paradigm is represented by Information Centric Networking (ICN) architectures implementing caching functions, which are studied in...
Wireless sensor networks are valuable assets to both the commercial and military communities with applications ranging from industrial control on a factory floor to reconnaissance of a hostile border. In most applications, the sensors act as data sources and forward information generated by event triggers to a central sink or base station (BS). The unique role of the BS makes it a natural target for...
With rapid growth of LTE network and Voice-over-LTE(VoLTE), detecting and preventing security threats like Denial of Service attack becomes a necessary and urgent requirement. VoLTE is an voice solution based on Internet Protocol and 4G LTE technology, at the same time exposing many vulnerabilities when using packet-switched network. There are many heavy weighted detection systems using content analysis,...
This paper aims to present a methodology and a set of tools that could be used in order to check the validity of an Intelligent Transport System. These tools will consider each ITS component, i.e. C-ITS- R (Road Side Units) RSU, C-ITS-V (On-Board Unit) OBUU, C-ITS-C (Central Server) with its specific fea- tures as location precision for an OBU and adequate forwarding of dangerous events for an RSU...
Software Defined Networks (SDN) provide a high simplification of the network management by decoupling the control plane from the data plane through the use of controllers. Distributed-Denial-of-Service (DDoS) attacks can make SDN controllers unavailable to process legitimate flow requests from switches. The main approaches to protect controllers against DDoS attacks are essentially based on the attack...
In this paper, the achievable rate of buffer-aided diamond relay systems under delay constraints is studied. The effective capacity, characterizing the maximum constant arrival rate to the source while satisfying the end-to-end delay constraints, is obtained for fixed decode-and-forward (DF) relaying schemes and selective relaying protocols. A selection relaying policy that maximizes the delay exponent...
We present a novel approach to support stateless forwarding in information centric networks with emphasis on the CCN/NDN architectures by proposing a space-efficient in-packet filter based on the encoded counting bloom filter. Proposed solution avoids the typical pitfalls of using classic Bloom Filters by significantly reducing the false positive transmission attempts, while supporting reliable and...
This paper conducts outage analysis for cooperative hybrid automatic repeat request with incremental redundancy (C-HARQ-IR). A general time-correlated Nakagami fading channel including fast fading and Rayleigh fading as special cases is considered. An efficient truncated inverse moment matching method is developed to derive the outage probability in closed- form. The accuracy of the analytical results...
The growing density of cellular users is placing an unprecedented demand on radio spectrum. Cognitive cellular networks can alleviate spectrum demand through dynamic spectrum access. In order to be fully functional, cellular users not only need spectrum access but also require network access. However, a cellular carrier grants network access only to accredited users. In this paper, we focus on the...
To integrate Software Defined Networking (SDN) in the envisioned 5G system, a separation of the control and user data plane functions of the Evolved Packet Core (EPC) is required. This separation will impact mainly the functions available at the Serving GateWay (SGW) and Packet data GateWay (PGW) elements, and will result in two new entities; i.e. the S/PGW-C and S/PGW-U (PGW-C and PGW-U). The S/PGW-C...
In this work, we address the relay selection problem for the wireless powered communication networks, where the relays harvest energy from the source radio frequency signals. A single source- destination pair is considered without a direct link. The connecting relay nodes are equipped with storage batteries of infinite size. We assume that the channel state information (CSI) on the source-relay link...
Modern cellular networks utilising the long-term evolution (LTE) and the coming 5G set of standards face an ever-increasing demand for low-latency mobile data from connected devices. Header compression is employed to minimise the overhead for IP-based cellular network traffic, thereby decreasing the overall bandwidth usage and, subsequently, transmission delays. We employ machine learning approaches...
Data collection is key issue in vehicular networks since it is vital for supporting many applications in vehicular environments. With the explosive growth of sensing data in urban area, however, strategies for efficient collection of big data in vehicular networks are still far from being well studied. In this paper, we focus on studying this issue and accordingly propose a Software Defined Vehicular...
Cloud computing is expected to keep growing and therefore more and more data centers are being built. In parallel of this increasing amount of data centers, there are also more cloud providers. On one side, this heterogeneity in the cloud market allows a user to choose and change its cloud provider. On the other side, thanks to this growing number of cloud providers, it is now possible to have small...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.