The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to the ubiquitous presence of cellular networks and their exemplary success, they have been pushed forward to provide connectivity for Internet-of-things (IoT) applications with mass deployments of sensors and machines. Nevertheless, existing transmission protocols, e.g., orthogonal allocation or spectrum sharing, can be detrimental for both existing cellular users and IoT devices due to increased...
In the recent years, mobile wireless technology has invaded the computer domain with the increased evolution of mobile devices in computing power, storage capacity, and other richer functionalities. Those devices are no longer restricted to phone calls and messages, but also for the access to internet (via WiFi, 3G, 4G …) and exchanging data via Bluetooth. On the other side, we have the great success...
This paper proposes a radio resource management scheme for the multi-RAT (Multiple Radio Access Technology) unit based MHN-E (Mobile Hotspot Network Enhancement) network that provides a millimeter-wave (mmWave) backhaul link of high-speed railway communications. We designed when multi-RAT unit configuration procedure is triggered and how it works, also explained detailed multi-RAT unit bearer configuration...
Mobile tactical networks (MTNs) in military communications extend the capabilities of mobile ad-hoc networks (MANETs). The MTNs are dynamic, infrastructureless, self-forming and self-healing systems designed for non-line-of-sight (NLOS) operations using multi-hop relaying. Unlike their commercial counterparts, MTNs have to offer much higher levels of security, jamming resistance, and service robustness...
Pervasive networks formed spontaneously by wireless mobile devices capable of ad hoc communication make it possible to get services from these devices, and to compose them dynamically so as to provide people with new and more sophisticated application services. Discovering, invoking and composing services in such networks are challenging tasks, due to the numerous and unpredictable connectivity disruptions...
This paper considers the problem of joining a network of constrained IoT devices. We propose to take advantage of Singer Cyclic Difference Sets (S-CDS) for a joining scheme that results in low duty cycles and apply the proposed scheme to the joining problem in 802.15.4e TSCH networks. S-CDS distributes the active periods of nodes over time so that a joining node does not suffer from long scanning...
In distributed Smart Farming applications, a reliable communication is often crucial, in particular during collaborating operations. In rural areas, the network connectivity via Public Land Mobile Networks is, however, not always sufficient. Network disruptions may occur hindering reliable transmissions. For the delivery of periodic sensor data streams of agricultural machines, several modern communication...
The wide diffusion of mobile devices that natively support ad hoc communication technologies has led to a number of protocols for enabling and optimizing Mobile Ad Hoc Networks (MANETs). Nevertheless, the actual utilization of MANETs in real life is still limited, in part due to the lack of protocols for the automatic creation and evolution of ad hoc networks. Recently, a novel ad hoc protocol named...
In opportunistic networks, forwarding based protocols lead to a large amount of data flow to the highly connected nodes and unfairness of the nodes' traffic load, finally, it makes the highly connected nodes suffer congestion and results in the messages were discarded. To solve this problem, a congestion control algorithm based on Social Awareness is proposed in this paper. When choosing the next...
Explosion of mobile traffic will bring a heavy burden to the core network, and rapid growth of mobile devices, as well as increasing demand for delay-sensitive services poses severe challenges to future wireless communication systems. In this regard, local breakout is a promising solution to save core network load and, more importantly, to reduce end-to-end (e2e) delay of packets with local significance...
Emerging services for Intelligent Transport Systems put the information content at the centre of the communication process, require a seamless support of mobile users, and target a real-time and asynchronous data dissemination. The Information-Centric Networking paradigm has all the potentials to fulfill these requirements, thanks to its ability to distribute contents through publish-subscribe communication...
Over the past few years, Mobile Ad hoc net-works(MANETs) have gained importance in mission critical environments. Software defined radios(SDRs) have provided MANETs a platform for using Narrowband networking wave-form(NBNW) for concurrent voice and data transmissions. Traditional TDMA MAC protocols are not appropriate for such applications. In this paper we have proposed a distributed TDMA slot assignment...
With the development of smart terminals and mobile social networks, users can find potential friends who have similar interests by sharing personal attribute profile in mobile social networks (MSN). However, the personal attribute profile usually contains sensitive information, and if this information is captured by attackers, it may cause unexpected consequences. In this paper, we propose a privacy-preserving...
We present the first selectively secure hierarchical identity-based non-interactive key agreement (HIB-NIKA) in the standard model that does not explicitly require multilinear maps. We give a novel solution for resilience called "shadowing factor" to improve the security of HIB-NIKA and present a practical attack model of hierarchical key agreement to analyze the anti-forgery and anti-collusion...
In this paper, we call for a paradigm shift away from the wireless-access focused research efforts on 5G networked systems. We believe that the architectural limitations should share equal blame on issues of performance, reliability, and security. We thus identify architectural weakness on both sides of the mobile clients and the 4G network infrastructure. Our recent findings show that, contrary to...
The recent exponential growth of the Internet of Things (IoT) and its mobile devices asks for the advancement of mobile networks technology. In such direction, current and next generations of cellular and vehicular networks foresees adhoc communication. In such paradigm, as entities are constantly moving, connections between them are intermittent and of little, if none, reliability. Recent studies...
In recent decades, mobile communications and mobile Internet have become an integral part of the lives of millions of people around the world. The number of users of mobile devices is increasing from year to year. As a result, the need for the new system of mobile communication with-an even more advanced capabilities, which is the fifth-generation system (5G). In addition, the growth of the concept...
Mobile social networks (MSN) provide services formobile users to discover and interact with potential friends. Now, more and more people begin to pay attention to lookingfor a friend who has similar interests. However, when theymanage to measure the proximity between their own and other people's profile, they may do not want to reveal their private data. In this paper, we design a cloud aided privacy-preserving...
Recent results show that slotless, purely-interval based neighbor discovery protocols, in which time is assumed to be continuous, achieve significantly lower worst-case discovery latencies than time-slotted protocols. In slotted protocols, the discovery of device A by B and vice-versa occurs within the same slot, and hence the latencies for one-way and two-way discovery are identical.However, in purely...
The process of two wireless devices meeting over-the-air for the first time is referred to as neighbor discovery. In mobile ad-hoc networks, battery powered devices duty-cycle their radios during neighbor discovery. As a result, they transmit and receive for very short durations of time and sleep at other times.Energy-efficient protocols, which guarantee short, bounded latencies while achieving low...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.