The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, the development of wireless body area network (WBAN) is accelerated due to rapid development of wireless technology. In the WBAN environment, many WBANs coexist where communication ranges overlap with each other, resulting in the possibility of interference. Since many variety of applications exist in the WBAN environment, each prospective user may have different quality of service (QoS)...
Many technologies for IoT have been developed since the term, IoT, was introduced to the public. Each technology has said that it is superior to other technologies; however, there is no winner as of now. Recent trend is that whoever gets the most users in the market wins. Thus, companies who share mutual understanding began to organize consortiums to develop a common standard technology for IoT. Open...
The growth of electronic devices connected to the Internet brings new concerns. These include security, privacy, user rights, data generation, spectrum management, and liability. Countries and organizations are developing policies to accommodate the Internet of Things (IoT). In this paper, we identified IoT indicators useful for policy makers. We considered four categories of indicators. These were:...
High-level automation comes as standard in the Industrial IoT(IIoT) environment. Automated IIoT devices lead the improvement of factory operational efficiency. They helped to reduce operational time and personnel expenses, and helped to increase operational accuracy. IIoT devices for smart factory are various in types, and they are designed to fulfill their designated works for factory in diverse...
With the increase in population and automobiles, the traffic jam in urban areas is becoming a critical issue. These traffic jams especially at the intersections not only increase the delay for drivers, but also increase fuel consumption and the air pollution. The fixed-time traffic light controller is one of critical factors that affect the traffic flow at intersections. This paper proposes a new...
The resource constraint is one of the top issues in the Internet of Things network. All activity in the network node should be carefully designed and managed to support the resource efficiency of the network. Hence, an energy efficient transceiver like ZigBee is popularly used as the infrastructure for the Internet of Things edge network. This paper presents our method for efficient ZigBee router...
Polar coding is a low-complexity method for communication over noisy classical channels, which is capable of providing highly reliable data transmission. This paper proposes an enhanced polar codec scheme for mission critical applications in train-to-ground wireless communications. Firstly, we develop an enhanced polar coding scheme to support reliable data transmission under time-varying channel...
In this paper, a generalized OFDM (G-OFDM) which protects the out of band (OOB) leakage and satisfies the orthogonality between subcarriers is proposed for next generation wireless communications. This scheme maps many data symbols to many subchannels through filter matrix, unlike the conventional OFDM that maps a data symbol to a subchannel in a one-to-one fashion. In G-OFDM, the filter matrix is...
In this paper, we propose a clipping method for an adaptive QR decomposition (QRD)-M algorithm in multiple-input multiple-output (MIMO) systems. To reduce the computational complexity without a significant bit error rate (BER) degradation, the proposed algorithm eliminates unreliable candidate symbols using a clipping parameter. Particularly, in a low signal-to-noise ratio (SNR) regime, the proposed...
In this paper, we study channel-aware (CA) randomization for secure transmissions in a multicarrier system based on partial channel state information (CSI). In order to see the performance gain by CA randomization, we consider the secrecy rate and show that i) a positive secrecy rate can be obtained even if the channel to an adversary is stochastically more capable than the channel to a legitimate...
Monte Carlo integration is a numerical integration method using random numbers. The speed of convergence of the Monte Carlo integration can be faster by using appropriate chaotic random numbers generated by one-dimensional chaotic maps. This paper discusses the efficiency of Monte Carlo integration using chaotic random numbers generated by tent maps with a uniform distribution.
This paper proposes an enhanced Interface to Network Security Functions (I2NSF) framework. To improve the whole packet throughput and manage resource of Network Security Functions (NSFs), the enhanced I2NSF framework monitors NSFs and distributes incoming packets to NSFs efficiently. Even if the legacy framework that provides security services using Software-Defined Networking (SDN) and Network Functions...
Critical Infrastructures such as transportation or energy systems are central to the existence of modern societies. Due to the expected level of performance and developments like the shift towards renewable, fluctuating energy generation in Smart Grids, advanced monitoring and control systems are required for stable operation. This in turn increases the dependence on robust communication technology...
Because of the more and more diversified service, SFC needs to be dynamically and feasibly implemented. Thanks to NFV and SDN ideas, the new SFC architecture is defined to meet the requirements in the IETF. Based on the OpenFlow, the approach of the single flow table is used to implement SFC, but it is inefficient. As the number of service chains increases, the flow entries in the flow table increase...
Network function virtualization (NFV) is one of the promising technologies for the next-generation network. In the NFV environment, reliability and availability should be guaranteed at different levels through the use of monitoring frameworks; however, the current monitoring frameworks only focus on NFV infrastructure (NFVI)-related faults and not VM-related faults. In this paper, the current NFV...
Software Defined Networking (SDN) has proved to be a promising approach for creating next generation software based network ecosystems. It has provided us with a centralized network provision, a holistic management plane and a well-defined level of abstraction. But, at the same time brings forth new security and management challenges. Research in the field of SDN is primarily focused on reconfiguration,...
Quality of Service (QoS) in networking is a way of managing the network resources effectively. QoS has been widely used in traditional network and can also be implemented in Software Defined Network (SDN). Software Defined Network is a new network paradigm that decouples the control plane from the data plane in the network and thus create a network that is scalable, dynamic and easily manageable....
In this paper, we propose the architecture and schemes of optical camera communication (OCC) system for the internet of lights (IoL) comprising an attentive indoor environment in which rolling-shutter cameras (including smartphone cameras) are used to receive data from light sources. Evidently, the challenges of system mainly come from the receiver side because the primary purpose of cameras is to...
In this paper, we introduce novel techniques to improve the performance of representative Authentication Encryption (AE) functions namely Galois/Counter Mode of operation (GCM) on modern high-end IoT platforms (ARM–NEON), which support SIMD and cryptography instruction set. The GCM requires efficient counter mode of encryption and binary field multiplication. The 128-bit binary field multiplication...
Recently, a micro-service architecture has been adopted to an edge device in smart factory due to its maintainability and scalability. In the architecture, all services are generally implemented as Docker containers and deployed by Docker APIs which might be harsh to a factory operator. In this paper, we propose an easy-to-use web-based service deployment method for containerized service to in-factory...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.