The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This Transactions’ Special Issue is comprised of expanded papers from the 2017 IEEE Microwave Theory and Techniques Society (IEEE MTT-S) International Microwave Symposium Conference (IMS2017) held in Honolulu, HI, USA, June 4–9, 2017.
In this paper, we discuss using a game-theoretic approach for Network Slicing (in particular RAN Slicing) that enables fully dynamic allocation of spectrum. The algorithm allows radio resources from across the whole spectrum to be allocated to users from different slices, so avoiding the inefficiencies of fixed slices. By using game theory, we can apply constraints on the resources allocated to individual...
Wireless signals dispatched from a remote operations center to command wind turbines are prone to impulsive interferences. In this applied context, this paper proposes the use of a median filter to mitigate these impulsive interferences in a doubly-fed induction wind turbine. To a perfect proposal evaluation, a co-simulation with the wireless system model and the generator predictive control one is...
The BROGO algorithm has been recently presented for Leader Election in Wireless Sensor and IoT Networks, where after finding a spanning tree of a network, each leaf will route a message through its branch to the root in order to determine the leader in that branch. The root will then elect the global leader among the received branch leaders. The main drawback of this algorithm is a possible failure...
Most of the physical-layer authentication methods are based on the pre-knowledge of the channel information and the threshold is fixed before the communication process. In this paper, we propose a physical layer authentication method based on channel information and machine learning with a dynamic threshold in wireless communication environment. In this method, the threshold of the channel differences...
This paper presents a door lock system combine with augmented reality technology (AR) and mobile phone remote control system. The system consists four parts: augmented reality application, wireless network module, microcontroller, and electronic door lock. General access control has a keyhole or numeric keypad. Interested people can easily start from here that can open the door. The system only has...
A method for detecting human motion in complex scenarios based on Channel State Information (CSI) is presented. First, the sensitivity of CSI phase information to human motion is explored, especially to the strenuous motion. Through a large number of experiments, the influence of human motion on CSI phase is found out, and the characteristics of signal changes are extracted. The One-class Support...
The IEEE802.15.4e standard for Iow power wireless sensor networks defines a new mode called Time Slotted Channel Hopping (TSCH) as Medium Access Control (MAC). TSCH allows highly efficient deterministic time-frequency schedules that are built and maintained by the 6TiSCH operation sublayer (6top). In this paper, we propose a solution to limit the allocation of identical cells to co-located pair of...
We present an approach to tracking the behaviour of an attacker on a decoy system, where the decoy communicates with the real system only through low energy bluetooth. The result is a low-cost solution that does not interrupt the live system, while limiting potential damage. The attacker has no way to detect that they are being monitored, while their actions are being logged for further investigation...
Pervasive networks formed spontaneously by wireless mobile devices capable of ad hoc communication make it possible to get services from these devices, and to compose them dynamically so as to provide people with new and more sophisticated application services. Discovering, invoking and composing services in such networks are challenging tasks, due to the numerous and unpredictable connectivity disruptions...
Carrier Aggregation started to appear since release 10 of LTE, and offers higher data rates, but at the cost of increased Peak-to-Average-Power-Ratio (PAPR). This paper studies the distribution of PAPR through analyzing the Crest Factor (CF) which is the square root of the PAPR of the Carrier Aggregated OFDM (CA-OFDM) signals used in the downlink of LTE-A. Although the base station is not power constrained,...
Low Power Wide Area Networks (LPWAN) technologies have recently triggered many research efforts and standardization activities due to the inherent possibility of both providing long range wireless communications and guaranteeing a long life for very cheap sensing devices. At the same time, the increasing interest of telco operators into such kind of networks is due to the wide range of applications...
We investigate the problem of computing Completely Independent Spanning Trees (CIST) under a practical approach. We aim to show that despite CISTs are very challenging to exhibit in some networks, they present a real interest in ad-hoc networks and can be computed to enhance the network robustness. We propose an original ILP formulation for CISTs and we show through simulation results on representative...
Although IEEE 802.11p technology is standardized for road safety and efficiency applications, the channel congestion problem is its key weakness necessitating distributed congestion control (DCC) algorithms on different layers of the communication stack. In this paper, we propose DCC-enabled Contention based Forwarding scheme targeting multi-hop dissemination of Decentralised Event Notification Messages...
Mobile data traffic is growing daily and this presents a significant challenge as the broadcast nature of wireless channels makes it extremely vulnerable to security breaches. A recent report of NSF has estimated 78% of large organisation and 63% of small business are attacked annually, and these figures will continue to increase making the wireless security concerns worldwide. As a consequence, security...
Vehicle-to-Everything (V2X) communications encapsulate significant challenges as a result of the vast number of wireless technologies deployed, nodes mobility and large applications range. One of the greatest challenges is to provide adequate QoS guarantees even in this demanding environment. State-of-the-art solutions for QoS provisioning over wireless links are based on cross-layering packet schedulers...
The article presents an analysis of correlation-based clustering procedure in cooperative spectrum sensing. The motivation is to assess if it is more beneficial in terms of energy efficiency to group nodes according to the received signal-to-noise ratio (SNR) on the link between Primary User and node or according to the distance between nodes. To this end, a merged clustering measure is introduced...
This paper considers an orthogonal frequency division multiplexing system where the Effective Exponential SNR Mapping (EESM) is applied. We first present an approximate model in which the subcarriers grouped into one block are assumed to have the same channel coefficient and, subcarriers in different blocks have independent and identically distributed channel coefficients. Then, we present an algorithm...
The expansion of Internet of Things (IoT) and the evolution in communication technologies have enabled homes, cars even whole cities to be network connected. However, during an emergency incident, IoT devices have not been used to trigger emergency calls directly to healthcare providers mainly due to their constrained capabilities and lack of support session-oriented communications. Moreover, emergency...
Lattice codes used under the Compute-and-Forward paradigm suggest an alternative strategy for the standard Gaussian multiple-access channel (MAC). It has been proven that decoding an integer linear combination of the transmitted codewords enables higher data rates compared to decoding the messages individually. Recent work of Gasptar et al. proposed a new multiple access channel technique that they...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.