The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cognitive radio emerges as a promising technology to improve the utilization of the allocated spectrum. In a cognitive radio network, secondary users (SUs) need to sense the spectrum to obtain currently available channels and have to vacate the occupied channels when primary users (PUs) return. In cognitive radio networks, establishing a link through a common available channel is defined as the rendezvous...
In this work, we examine the secrecy capacity region of the block-fading broadcast channel with confidential messages (BCC) when the transmitter has limited knowledge of the channel. In particular, we consider a two-user communication system where the transmitter has one common message to be transmitted to both users and one confidential message intended to only one of them. The confidential message...
Data collection is key issue in vehicular networks since it is vital for supporting many applications in vehicular environments. With the explosive growth of sensing data in urban area, however, strategies for efficient collection of big data in vehicular networks are still far from being well studied. In this paper, we focus on studying this issue and accordingly propose a Software Defined Vehicular...
In this paper, we propose a secure transmission protocol for two users exchanging their respective information in an n-hop MIMO Ad hoc network. By exploiting the properties of the transmission medium in the physical layer, three channel models are utilized to provide secure transmission, namely one-way relay channel, two-way untrusted relay channel, and multiple access channel. Using these channel...
With the explosive development of social networks, users' behaviors are prone to be socially connected. Social Network Operator (SNO) can effectively collect communication data which reflects users' social behaviors and construct a social graph which precisely characterize relationship among users. Users who exert online influence on their friends can potentially affect their friends' demand for wireless...
In this paper we investigate the capacity of random wireless networks in which transmitters are equipped with multiantennas. A quantized version of channel direction information (CDI) is also available, provided by the associated single antenna receivers. We adopt tools of stochastic geometry and random vector quantization to incorporate the impacts of interference and quantization errors, respectively...
In this paper, we propose a novel distributed deadline-based routing and spectrum allocation algorithm for tactical ad-hoc networks. The proposed algorithm will enable nodes to adapt to various deadline requirements unique to each traffic classes. A tactical ad-hoc network needs to handle a variety of data flowing through the network including voice, surveillance video, threat alert among others....
When social behaviors are considered into ad hoc wireless networks, the users prefer to forward the traffic from their social contacts. In this way, the network capacity is highly related with the social characteristics. To this end, we apply a social contact based wireless network model and explore its throughput capacity. The wireless network capacity will get improved when the contacts are located...
The emerging Internet of Things paradigm has triggered an explosion in ad-hoc applications that require connectivity among the nodes of wireless networks. However, the channel randomness and the random deployment of such networks could cause missed detections by isolated (i.e., unable to disseminate their messages) or inactive (i.e., without enough energy to transmit) nodes. Moreover, as the number...
In multi-channel cognitive radio ad hoc networks (CRAHNs), packet fragmentation is impacted by new factors besides those in traditional wireless networks due to the unique CR functions. For example, spectrum handoff is the technique for a secondary user (SU) to continue its transmission when a primary user (PU) reoccupies its current transmitting channel. Then, a short frame is less likely to be affected...
Wireless networks with directional antennas, like millimeter wave (mmWave) networks, have enhanced security. For a large scale mmWave ad hoc network in which eavesdroppers are randomly located, however, eavesdroppers can still intercept the confidential messages, since they may reside in the signal beam. This paper explores the potential of physical layer security in the mmWave ad hoc networks. Specifically,...
The multi-copy routing paradigm in Delay Tolerant Networks (DTNs) implies that increasing contact bandwidth leads to a decrease in data delivery delay and an improvement in throughput. With Hybrid Radio Frequency/Free Space Optical (RF/FSO) PHY layers, the high data rate FSO links can be used to increase the contact bandwidth. However, due to the highly directional nature of FSO links, broadcasting...
In this paper, we study the connectivity probability of linear multi-hop ad hoc networks operating in an interference-limited environment. The nodes in the network are assumed to form a Poisson point process (PPP), and they generate mutual interference during communications. A node communicates to other nodes in the network by using its intermediate neighbors as relays. The average node density plays...
D2D communication and cognitive radio are among the key technologies that can solve the bandwidth bottleneck problem of cellular networks. These technologies help to maintain necessary communication between the user devices in case of natural disasters and traffic hotspot situations. In this paper, we efficiently employ the relay selection and cooperative beamforming (CBF) strategies for D2D communication...
Recent advancements in manufacturing and favorable regulatory positions make millimeter wave (mmWave) a target for next-generation wireless networks. For a variety of use-cases, it is reasonable to assume users will be clustered around a central point (e.g. WiFi hotspot) rather than uniformly located. In this paper, we develop analytic expressions for the capacity of clustered mmWave ad hoc networks...
In this paper, we propose a novel Media Access Control (MAC) scheme for Cognitive Radio Ad Hoc Networks (CRAHNs). The scheme includes two mechanisms. One mechanism is called Exposed Terminal Secondary users Communication (ETSC), which allows a Secondary User (SU) to continue communication attempt even when the occupied channel could be used by a new Primary User (PU). The other is called Four-Stage...
As the number of mobile devices that natively support ad hoc communication protocols increase, large ad hoc networks can be created not only to facilitate communication among the mobile devices, but also to assist devices that are executing computationally intensive applications. Prior work has developed computation offloading systems for mobile devices, but this work has focused exclusively on offloading...
Most prior algorithms for influence maximization focused are designed for Online Social Networks (OSNs) and require centralized computation. Directly deploying the above algorithms in distributed Mobile Social Networks (MSNs) will overwhelm the networks due to an enormous number of messages required for seed selection. In this paper, therefore, we design a new cross-layer strategy to jointly examine...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.