The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The terahertz band is an unlicensed frequency range that is expected to be exploited in the near future for different types of communications, including wireless communication in Nano-scale Sensor Networks (NSNs). However, as terahertz band is the resonance frequency of many molecules, communication in this band is severely affected by molecular absorption noise and attenuation. Molecular absorption...
The state-of-the-art network anomaly detection systems are often unable to correctly verify source of anomalies; they have occurred in situ or in transit. To address this issue, this study proposes an agent-enabled anomaly detection system in which mobile agents perform in situ verification of sensor nodes to verify source of anomalies. Moreover, mobile agent cannot be freely transmitted over the...
Wireless Sensor Network (WSN) consists of a large number of small sensor nodes (SNs) that are usually deployed in hostile environments. These nodes are vulnerable to a number of security attacks and it is difficult to implement complex cryptographic schemes in SNs due to their resource constrained nature. Hence, WSNs need energy efficient and secure communication schemes in terms of storage space,...
Wireless communication applications have become more prominent in terrestrial than underwater. However, in the recent years, researchers have shown fervent interest to explore and fulfil the needs of a multitude of underwater applications. UWSN (underwater wireless sensor network) is envisioned to enable application for oceanographic data collection and offshore exploration for the profusion of wealth...
With the proliferation of data, components and services on the internet, cyber-physical systems are growing up these last years. Machine-to-Machine (M2M) is an example of a cyber-physical system where mobile communication is enabled between sensors, gateways and application services. M2M is used in several domains and in particular, in critical ones such as the healthcare domain. In such domain, requirements...
Mobile Augmented Reality (MAR) is generally defined as the service that is capable of enhancing the real-world camera views of a smartphone with extra information on top of the screen. Thus, MAR has triggered strong interests in mobile ecommerce, location-based service, etc. However, MAR is usually constrained by the local storage and computing power of the device as well as the latency and bandwidth...
Next generation Wireless Mesh Networks (WMNs) will require a link scheduler that exploits the full advantage of Multi-Transmit-Receive (MTR) commuication. To this end, we design a distributed link scheduler called Voting-ALGO that is aware of queue lengths and uses the celebrated max weight policy to achieve 100% throughput.
Due to the ability to provide more precise and user friendly information, video streaming delivery over vehicular ad hoc networks (VANETs) has become a hot topic in recent years. In spite of many challenges, several routing schemes have been proposed. However, these schemes excessively focused on the minimization of delivery delay, and did not realize that immoderate utilization of wireless fading...
One critical issue for vehicular safety applications is how to timely and reliably disseminate kinetic information, known as beacon, among vehicles. In this paper, we try to improve the beacon dissemination performance in vehicular ad hoc networks (VANETs) especially in drastic disturbance scenarios. To this end, a decentralized beacon dissemination control scheme (DBDCS) is proposed from the cyber-physical...
In this paper, we study the compatibility of operating multiple Long Term Evolution (LTE) mobile handheld devices in the digital dividend spectrum identified in Australia. European studies provide some valuable insights on the operation of mobile services in the digital dividend, the results however do not provide a direct comparison due to difference in the DVB-T transmission band plan, the DVB-T...
In vehicle-to-vehicle communication, safety messages could be broadcasted over one-hop or multi-hop using different transmission ranges to warn each other of changing conditions or dangers ahead. We investigate the broadcast performance considering one-hop and multi-hop transmissions and study the effect of different transmission ranges on the multi-hop broadcasting performance. Our results show that...
In this paper, we propose a distributed heuristic solution for the replica placement problem in Wireless Mesh Networks (WMNs). This problem is known to be NP-complete. Our heuristic considers the local popularity of an object replica. The local popularity can be defined as the relative demand for an object within a partition of the network compared to the whole network. The heuristic collects popularity...
Current wireless technologies for industrial application, such as WirelessHART and ISA100.11a, use a centralized management approach which makes it difficult and costly for harvester-powered I/O devices to re-join the network in case of power failure. The communication overhead and delay to cope with the dynamic environment of a large-scale industrial network are also very high for an I/O device....
Internet companies have been exploiting the massive penetration of smart phones by developing applications of instant messaging, group communication, file sharing, etc. Rich Communication Services (RCS) allow telecom operators to provide their clients experiences beyond voice and SMS, and therefore, to compete against widely extended IP-based services such as Skype or Whatsapp using IP Multimedia...
Traditionally, wireless sensor networks collect readings from distributed embedded sensing systems and forward them to one or more sink nodes. While many energy-efficient data collection protocols have emerged as a result, the transmission of control commands from a sink to individual nodes in the network is generally unsupported by these solutions. We present how the receiver-initiated opportunistic...
Nowadays, clusters of interconnected workstations have become a common solution for powering large composite displays, also called “cluster display walls”. Our paper is focused on analyzing a specific type of heterogeneous cluster display wall developed with Google Technology, named Liquid Galaxy, running the well-known Google Earth application.
Today, the performance of routing mechanisms in Wireless Multihop Networks (WMNs) is still limited by the lower layers. While recent cross-layer approaches take advantage of the characteristics of the medium, they are often based on traditional physical layers such as OFDM. State-of-the-art techniques used in one-hop scenarios, such as OFDMA or MIMO, pose a significant challenge in practical multihop...
Broadcasting is the most prevalent method for disseminating information in vehicular networks. At high vehicle densities, the so-called broadcast storm problem degrades the efficiency of broadcasting. A so-called Irresponsible Forwarding (IF) scheme has recently been proposed in the literature that can effectively combat the broadcast storm problem. For messages consisting of multiple packets, the...
Physical layer techniques enable new security paradigms in wireless networks, such as node authentication based on channel characteristics. However, current approaches are often limited to one-hop scenarios. We investigate how the aforementioned authentication schemes can be extended to the multihop case. In particular, we design mechanisms to provide path signatures, which allow destination nodes...
The Self-Organizing Network (SON) paradigm enables automated management of next generation mobile communication networks by introducing a set of autonomous functions that jointly achieve self-configuration, self-optimization, and self-healing. Each SON function is driven by a specific objective to optimize one or more Key Performance Indicators (KPIs). If a function encounters situations in which...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.