The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With rapid growth of LTE network and Voice-over-LTE(VoLTE), detecting and preventing security threats like Denial of Service attack becomes a necessary and urgent requirement. VoLTE is an voice solution based on Internet Protocol and 4G LTE technology, at the same time exposing many vulnerabilities when using packet-switched network. There are many heavy weighted detection systems using content analysis,...
Efficient transmission power control is indispensable for cellular networks. It not only provides a high energy efficiency, but also maintains reliable connections. With the emergence of 5G mobile technology, the presence of device-to-device (D2D) communications within the cellular network has stimulated research on radio resource sharing. In this paper, we consider an underlay D2D network operating...
This paper considers the optimal energy-efficient transmission policy in time-sharing multiuser systems with a hybrid energy harvesting transmitter. The system operation energy is supplied by a constant energy source which is driven by a non-renewable resource and an energy harvester which harvests energy from its surrounding environment. Our goal is to maximize the energy-efficient transmission of...
The Cloud Security Alliance lists data theft and insider attacks as critical threats to cloud security. Our work puts forth an approach using a train, monitor, detect pattern which leverages a stateful rule based k-nearest neighbors anomaly detection technique and system state data to detect inside attacker data theft on Infrastructure as a Service (IaaS) nodes. We posit, instantiate, and demonstrate...
This paper introduces a frequency synchronization method applicable to multiple access in direct spectrum division transmission (DSDT). In the transmitter (Tx) side, DSDT divides the single carrier modulated signal into multiple sub-spectra and assigns them to unused frequency resources. In the receiver (Rx) side, the divided sub-spectra are recombined and the single carrier modulated signal is regenerated...
The compromise of confidential information will lead to catastrophic disaster during the operation and control in the next generation of power grid. With more advanced yet vulnerable techniques integrated, the system is more exposed to malicious attackers compared with isolated old systems. In this paper, we investigate the privacy issues in the optimal control of load-frequency with information exchange...
This paper studies a robust beamforming optimization problem of minimizing total transmit power in a distributed manner in the presence of imperfect channel state information (CSI) in multicell interference networks. Due to the fact that worst- case is a rare occurrence in practical network, this problem is constrained to satisfying a set of signal-to-interference-plus-noise-ratio (SINR) requirements...
This paper aims to present a methodology and a set of tools that could be used in order to check the validity of an Intelligent Transport System. These tools will consider each ITS component, i.e. C-ITS- R (Road Side Units) RSU, C-ITS-V (On-Board Unit) OBUU, C-ITS-C (Central Server) with its specific fea- tures as location precision for an OBU and adequate forwarding of dangerous events for an RSU...
We improve upon our previous upper bound on the secrecy capacity of the wiretap channel with multiple transmit antennas and single-antenna receivers, with noisy main channel state information (CSI) at the transmitter (CSI-T). Specifically, we show that if the main CSI error does not scale with the power budget at the transmitter $\bar{P}$, then the secrecy capacity is bounded above essentially by...
Hardware calibration is a necessary procedure to establish the reciprocity of the uplink (UL) and downlink channels (DL) in a time division duplex (TDD) mode of operation. In practice, any calibration scheme is prone to errors. Such errors result in a residual mismatch between UL and DL channels, which, in turn, can significantly affect the quality of DL transmission. In this paper, we study the effects...
Sweep coverage is an important problem in wireless sensor networks. With sweep coverage, more Points Of Interests (POIs) can be monitored with fewer mobile sensor nodes thanks to the mobility of the nodes. Most existing studies on sweep coverage focus on the trajectory of the mobile sensor nodes to guarantee the sweep coverage of the POIs. Considering the fact that, in many applications, the collected...
In this paper we present our latest findings on dynamic user-centric scheduling for a flexible 5G radio design, capable of serving users with highly diverse QoS requirements. The benefits of being able to schedule users with different transmission time intervals (TTIs) are demonstrated, in combination with a user-centric multiplexing of control and data channels. The proposed solution overcomes some...
In this paper, we investigate the performance of spatial modulation (SM) for vehicle-to- infrastructure (V2I) and vehicle-to-vehicle (V2V) communications over a generalized multiple scattering channel. This channel model provides a realistic statistical description of an intervehicular communication environment and includes as special cases the Rician, Rayleigh, and double-Rayleigh channels. We derive...
This paper investigates the performance of bidirectional dynamic networks (BDN) with massive multiple input multiple output (MIMO) systems. In BDN, dynamic allocation of the number of uplink and downlink remote radio heads (RRHs) is proposed, which offers a flexible solution to balance the data traffic asymmetry without requiring the time synchronization. Intuitively, the interference between the...
Elevation beamforming and Full Dimension MIMO (FD-MIMO) are currently active areas of research and standardization in 3GPP LTE-Advanced. FD-MIMO utilizes an active antenna array system (AAS), that provides the ability of adaptive electronic beam control over the elevation dimension, resulting in a better system performance as compared to the conventional 2D MIMO systems. FD-MIMO is more advantageous...
As the explosion of Internet traffic is quickly leading to overloaded cellular network, device-to-device (D2D)-based content sharing is proposed as a method to offload mobile data traffic. The performance of D2D-based content sharing is dramatically affected by the success rate of content fetching from nearby devices and quality of content transmission, which is determined by the geographic distribution...
Energy harvesting (EH) two-hop communications are considered. The transmitter and the relay harvest energy from the environment and use it exclusively for transmitting data. A data arrival process is assumed at the transmitter. At the relay, a finite data buffer is used to store the received data. We consider a realistic scenario in which the EH nodes have only local causal information, i.e., at any...
In cloud market, cloud providers offer diverse service options, including on-demand instances and reserved instances. Generally reserved instance price is cheaper than on-demand instance, but excessive reservation may result in high capacity underutilization. To improve resource utilization rate and reduce providers' service cost, a steady broker federation is necessary to propose. Broker federation...
Data-driven solutions to Electric Vehicle (EV) range estimation is attracting attention recently due to the prevalence of Internet of Things (IoT). However, there raise the Big Data problems with the increased volume and number of sensory sources of unstructured data collected from the EV equipped with In-Vehicle Networks. This means that traditional statistical analysis and Machine Learning tools...
Millimeter wave multiple-input multiple-output (MIMO) communication systems must operate over sparse wireless links and will require large antenna arrays to provide high throughput. To achieve sufficient array gains, these systems must learn and adapt to the channel state conditions. However, conventional MIMO channel estimation can not be directly extended to millimeter wave due to the constraints...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.