The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
For communication secrecy, we develop the cooperative transmission strategies by taking into account the degree of trust between users as well as physical wireless channels. For a given trust degree information, we derive an optimal power allocation for confidential message and jamming signal to maximize an expected secrecy rate with respect to the trust degree information. In order to further increase...
In this paper, to simultaneously protect the location privacy of each mobile user and improve the performance of the data dissemination process in the mobile social network (MSN), we propose a privacy-preserving data dissemination (PAD) protocol by utilizing the Paillier cryptosystem and its homomorphic property. With PAD protocol, the delivery ratio of the MSN will be improved by selecting several...
With the rapid development of internet of things (IoT) with various low-cost machine type communications (MTC) devices, intelligent wearable devices, vehicular sensors and environmental sensors etc, it's anticipated that trillions of wireless nodes in IoT with diversified applications and services may come to life in the fifth generation wireless communication system (5G). These devices, however,...
In rotatable and directional (R&D) sensor networks, each sensor has sector-like sensing range and rotation ability. These sensors can support temporal coverage of objects by periodically rotating to cover them. We define that an object is δi-time covered if it is covered by a sensor for at least 0 < δi ≤ 1 portion of each period. Given a set of objects where they may have different δi-time...
In this paper, we present an economic model for offloading data from subscribers of a large scale cellular operator to a small scale WLAN in a multi-hop cellular environment. We make use of a hexagonal tessellation deployed with relay elements to model the multi-hop capability. An incentive-based model helps to determine the behavior of the cellular and WLAN operator, as the cellular operator decides...
Since the seminal work of Grossglauser and Tse [1], the two-hop relay algorithm and its variants have been attractive for mobile ad hoc networks (MANETs) due to their simplicity and efficiency. However, most literature assumed an infinite buffer size for each node, which is obviously not applicable to a realistic MANET. In this paper, we focus on the exact throughput capacity study of two-hop relay...
The Sensor Relocation (SR) problem is an important issue in Wireless Sensor Networks (WSNs). For WSNs with an ongoing surveillance task, it is necessary to follow a strict response time requirement when relocating redundant sensors to the requesting places. In this study, we revisit the SR problem in mobile WSNs. The proposed algorithm can find the redundant sensor nearest to the requesting place...
Connectionless multicast protocols are well suited for networks with a large number of small multicast groups. These protocols however do not scale with large groups, and are not robust for high mobility. We proposed a connectionless multicast protocol named MCOM that addresses the issues of mobility, scalability, and robustness. The MCOM protocol design allows for better scalability by group size...
In wireless sensor networks (WSNs) with mobile sinks, some stationary sensor nodes, known as network collection points (NCPs), can communicate with mobile sinks to collect sensed data. Most existing works on mobile WSNs assume that mobile sinks directly communicate with NCPs via point-to-point links. Consequently, recent advances in cooperative communications, which are more energy-efficient than...
Unmanned Aerial Vehicles (UAVs) have emerged as promising relay platforms to improve the connectivity of ground Mobile Ad Hoc Networks (MANETs). Due to the relatively high cost of UAVs, a lot of efforts have been made to optimize the deployment of UAVs so that the number of UAVs needed in maintaining the connectivity of ground nodes can be minimized. However, existing work on optimization of UAVs'...
The real achievable performance of mobile ad hoc networks (MANETs), in particular the performance of such networks under practical constraints, is still largely unknown by now. As a step forward in this direction, this paper focuses on a MANET where a maximum allowed delivery delay is imposed to each packet and examines the impact of such delivery delay constraint on its real achievable performance...
This paper analyses the potential of utilising small unmanned-aerial-vehicles (SUAV) as wireless relays for assisting cellular network performance. Whilst high altitude wireless relays have been investigated over the past 2 decades, the new class of low cost SUAVs offers new possibilities for addressing local traffic imbalances and providing emergency coverage. We present field-test results from an...
This paper studies the exact per node throughput capacity of a MANET, where the transmission power of each node can be controlled to adapt to a specified transmission range v and a generalized two-hop relay with limited packet redundancy f is adopted for packet routing. Based on the concept of automatic feedback control and the Markov chain model, we first develop a general theoretical framework to...
Recent advances of loop interference cancellation techniques enable full-duplex relaying (FDR) systems, which transmit and receive simultaneously in the same band with high spectrum efficiency. Unlike the existing works, in this paper, we study the energy efficiency aspect of resource allocation in FDR systems. We consider a OFDMA cellular network, where a shared FDR is deployed at the intersection...
Relay-assisted Device-to-Device (D2D) communication is an enhanced technology for D2D communication. With relay nodes' assistances, the communication distance of the D2D pair is extended and the quality of communication can be improved. This paper focuses on the achievable transmission capacity of relay-assisted D2D network while keeping a low outage probability of the cellular users. based on stochastic...
In this article we propose solutions to diverse conflicts that result from the deployment of the (still immature) relay node (RN) technology in LTE-A networks. These conflicts and their possible solutions have been observed by implementing standard-compliant relay functionalities on the Vienna simulator. As an original experimental approach, we model realistic RN operation, taking into account that...
Vehicular Ad Hoc Network (VANET) plays a crucial role in enabling important safety applications such as emergency messages dissemination for alleviating traffic accidents and congestion in urban transportation system. Warning information dissemination is of increasing significance in urban highways due to their special topology structure. Hovering Information is a new paradigm for sharing location-aware...
We introduce a new achievability scheme, termed opportunistic network decoupling (OND), where a novel relay scheduling strategy is utilized in the K × N × K channel with interfering relays, consisting of K source — destination pairs and N half-duplex relays in-between them. A subset of relays using alternate relaying is opportunistically selected in terms of producing the minimum total interference...
Mobile social network (MSN) has been widely studied as a novel and effective way for communication in the current era of fast developing mobile devices, which enables the contents and services to be delivered opportunistically when mobile users contact. In this paper, we aim to optimize the content delivery from the content provider (CP) to the subscribers via relays in between. Tandem queueing model...
Cooperative networking is a promising technology to meet the rapidly growing demand of mobile data traffic. To stimulate effective and trustworthy user cooperation, we leverage the knowledge of the social tie structure among mobile users and develop a social trust based cooperative D2D relaying framework, which takes into account both physical distances and social distances among users. Based on (finite-horizon)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.