The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The last hop of the Internet towards the end-user is mostly supported by wireless technologies and thus interconnects multiple users, that should, ideally, be served simultaneously. The shared media capability of such last hop is, however, underused, asthe principle behind wireless technologies implies that only one user can be served at an instant in time. Aiming at allowing multiuser transmission...
In this paper, we propose G-Loc which leverages the gradient-based fingerprint map in localization. G-Loc firstly builds a gradient-based map (Gmap) by comparing RSSI values at nearby positions and runs an online extended particle filter to localize the user/device. With the robust Gmap, G-Loc can be more adaptive to the time-variant RSSI and effectively reduces the overhead in fingerprint map calibration...
Prospective IEEE 802.11p-enabled automotive video applications are identified. Preliminary experimental results of inter-vehicular live video streaming for surveillance applications are presented. A test-bed for the demonstration of the achievable visual quality under different channel conditions is described.
Software defined Networking (SDN) such as Open-Flow decouples the control plane from forwarding devices and embeds it into one or more external entities called controllers. We implemented a framework in OpenFlow through which business customers receive higher Quality of Service (QoS) than best-effort customers in all conditions (e.g. failure conditions). In the demonstration, we stream video clips...
This demo presents a novel multirate multicast scheme for video delivery to wireless users. We demonstrate an adaptive scheme that combines differential backlog scheduling and intelligent packet dropping, both based on local information. An important feature of this scheme is that it does not require centralized calculations. We focus on 802.11 mesh networks and we show that our solution copes efficiently...
Most of existing network testbeds can only support the experimentation of L2∼L4 forwarding protocols, leaving the evaluation of L4∼L7 applications still a tremendous challenge. This paper pioneers to present the design of sea-cloud innovation environment (SCIE) based on the software defined networking (SDN) and network functions virtualization (NFV) paradigms to support adaptive service-oriented experimentation,...
Smartphones contain sensors that provide information about the user of the device. Studying smartphones, therefore, provides an invaluable window into the behavioral patterns of users. In this work, we describe an open infrastructure that provides research communities with principled access to mobile devices and their sensors. Our platform, the Sensibility Testbed, is a free, community-driven platform...
In the IoT (Internet of Things), inconsistent ACP (Access Control Policies) would cause disastrous consequences, for example, fire disasters and failures of cardiac pacemakers, as a result, ACP should be verified before they are applied. Tediousness and error-proneness of manual verifications make automatic and formal verification necessary. In this paper, timed automata is presented to formally model...
Mixed data transmission strategies have been proposed to address the energy imbalance problem in wireless sensor networks. However, whether the energy of all nodes can be balanced by this approach, especially under the communication range constraints of sensor nodes, is lack of study. In this paper, we present a novel analytical model for the two-hop based mixed data transmission and derive its energy...
Long-distance WiFi networks are a cost-effective means for providing Internet connectivity in developing regions. In these regions, providing support for real-time applications is considered an important requirement. Unlike prior works, this paper studies the effectiveness of features (e.g., frame aggregation and channel bonding) of 802.11n/ac in improving the performance of long-distance WiFi links...
The incompleteness of the Internet AS-level topology is the most serious pitfall of research studies concerning the Internet inter-domain ecosystem. In this demo we show two projects aimed at filling this gap by offering services to different type of users. The first is Portolan, a smartphone-based crowdsourcing system which provides an app for Android that volunteers can install to run traceroute...
In the past couple of years, various information-centric networking (ICN) architectures have been proposed to address the existing problems of the current Internet, each of which from a different perspective. Thus, it becomes critical to deploy and interoperate different ICNs on top of the same physical network infrastructure. This demo presents SD-ICN, a software-defined interoperable deployment...
Efficient content delivery is a constantly evolving challenge on the modern Internet. Reducing the impact of duplicate deliveries of identical content is a key factor in reducing congestion and transit costs for smaller networks. This work leverages SDN concepts and mechanisms in order to transparently store and deliver content from a local cache to the client, thus lightening the load on the WAN...
Cloud based Content Delivery Networks have emerged over the last years as a viable cost-effective alternative to traditional CDNs. In this work we demonstrate a novel surrogate server placement strategy for fostering content delivery within the evolving wireless Cloud environment by combining Social Network Analysis inspired metrics and virtual network embedding strategies. The proposed paradigm,...
Recent advances in cognitive radio have identified the small-cells among the most promising future wireless networking scenarios. Utilizing radio context information, small-cells should perform the most optimal radio resource management (RRM) to maximize performances and minimize inter-cell interference. Radio Environmental Maps (REM) data: empirical propagation models, active transmitters' locations,...
This paper presents a demonstrator of Low-Power Distributed Queuing (LPDQ), a MAC protocol targeted at active RFID systems operating at 433 MHz. LPDQ is based on a packet-based Preamble Sampling for network synchronization and Distributed Queuing for channel access. Compared to the MAC protocol defined in the ISO 18000-7 standard, based on an analog Preamble Sampling and Frame Slotted ALOHA, LPDQ...
This work studies security-oriented cooperation schemes, addressing three possible cooperation scenarios, namely the jammer only, relay only and the relay-jammer pair. The cooperation scheme is adaptively selected according to the security requirement and network's operational conditions. The selection of a relay or/and a jammer as well as their transmit power are jointly optimized with the objective...
We propose Authentication and Key Agreement (AKA) for Machine Type Communications (MTC) in LTE-Advanced. This protocol is based on an idea of grouping devices so that it would reduce signaling congestion in the access network and overload on the single authentication server. We verified that this protocol is designed to be secure against many attacks by using a software verification tool. Furthermore,...
Mobile social networks (MSNs) are a kind of delay tolerant network that consists of lots of mobile nodes with social characteristics. Recently, many social-aware algorithms have been proposed to address routing problems in MSNs. However, it also brings more security and privacy concerns. In this paper, we discuss a specific type of Sybil attack in MSNs, which few researches has been focused on. We...
With the problem that the non-cooperation of selfish nodes causes by location privacy leakage and resource consumption, some researchers proposed a bargaining-based game for cooperative authentication in MANETs. In this game, a fundamental issue is to study how the asking/bidding price affects the cooperative willingness of nodes. To address the problem that the improvement of cooperative willingness...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.