The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We study a secure communication scenario in which the channel is under two classes of attacks at the same time: a passive eavesdropper and an active jammer. This scenario is modelled using the arbitrarily varying wiretap channel (AVWC), in which the channel varies from one channel use to the other. It has been shown that in general reliable communication over AVWCs requires some sort of coordination...
In the IEEE 802.15.4-2015 standard, Time Slotted Channel Hopping (TSCH) aims to guarantee high-level network reliability by keeping nodes time-synchronised. In order to ensure successful communication between a sender and a receiver, the latter starts listening shortly before the expected time of a MAC layer frame's arrival. The offset between the time a node starts listening and the estimated time...
In this paper, a cooperative diffusion-based molecular communication system is considered where distributed receivers collaboratively determine a transmitter's signal. In this system, the receivers first make local hard decisions about the current transmitted bit and then report these decisions to a fusion center (FC). The FC combines the local hard decisions to make a global decision using an N-out-of-K...
Asynchronous Radio Duty Cycling (ARDC) protocols can make embedded networked devices more energy efficient by keeping their radio off most of the time without a need for synchronization between devices. Some ARDC protocols can operate under 6LoWPAN adaptation layer in order to enable the vision of Internet-of-Things for battery operated devices. In this paper, we propose three different protocols...
In the simultaneous wireless information and power transfer (SWIPT) system, due to the broadcast nature of wireless radio, the energy receiver may act as a potential eavesdropper to eavesdrop the information sent to the information receiver. To address this issue, in this paper, we propose an optimization framework of target secrecy rate and power allocation ratio based on secrecy outage probability...
Low probability of detection (LPD) communication refers to reliable transmission of information that is difficult to detect by an unauthorised adversary. This paper studies LPD communication over parallel Gaussian channels, which are used to model a variety of communication scenarios. First a lower bound on the miss detection probability is derived assuming the adversary employs Neyman-Pearson hypothesis...
In this article, we propose an ordered multi-branch (OMB) processing for successive interference cancellation (SIC) based symbol vector detection techniques in multiple-input multiple-output (MIMO) spatial multiplexing systems. In the proposed method multiple ordered branches are initiated in parallel where each branch employ SIC based detection with different ordering pattern. To generate multiple...
Communications Operations Procedure-1(COP-1) is widely used for reliable transmission of telecommand data for space missions. This paper focuses on the delay performance of COP-1 protocol over long and lossy link. The typical work conditions and process are studied combined with the characters of both the link and the transmission task. Based on the analysis of the procedure, the quantificational...
Rateless erasure code (REC) is an erasure code, where the encoder generates a potentially infinite number of encoded symbols and the original message can be reconstructed from a sufficient number of correctly received packets. Many REC-based transmission protocols have been proposed for improving network throughput in lossy channel. However, state-of-the-art RECs (such as LT code and Raptor code)...
The paper deals with the aspects of implementation and validation of the SpaceWire-R protocol as carried out in the ESA-funded project SpaceR. We give a brief overview of the SpaceWire-R protocol for providing reliable data transfer services over SpaceWire networks and describe the SpW-R protocol software implementation elaborated in the SpaceR project. The testing platform developed for validation...
Smart grid can be viewed as a modern electric power grid infrastructure with enhanced reliability, flexibility and efficiency that is achieved through automated control of production and distribution of electric power, modern communications infrastructure, smart monitoring devices, and renewable energy resources. New features introduced by smart grid means that substation communication is more complex...
In ad hoc networks, terminals form a network with decentralized and self-organizing manners. Although this can surely extend its potentials, it also suffers from unstable and unreliable communication environments. As concerns this, a broadcast-based routing protocol called opportunistic routing (OR) has been proposed. ORs do not establish any specific route from a source terminal to a destination...
We consider a communication scenario in which the channel undergoes two different classes of attacks at the same time: a passive eavesdropper and an active jammer. This scenario is modeled by the concept of arbitrarily varying wiretap channels (AVWCs), in which the channel varies from one channel use to the other in an unknown and arbitrary manner. It has been shown that uncorrelated codes fail to...
In this paper, the turbo principle is applied to the existing least symbols error rate(LSER) decision feedback equalization(DFE) for underwater channel. The performance of the DFE adaptive algorithms are aided by soft information delivered from the channel decoder. We introduce a variable step size scheme that takes soft information into account to get the more suitable step size which can reduce...
Underwater acoustic sensor networks (UASNs) are widely used in many application. However, the underwater acoustic channel poses many challenges for reliable data transmission protocol design. In this paper, we propose a new data transmission protocol based on Fountain codes and Selective-repeat ARQ scheme (FSR-ARQ). The new approach utilizes the packet error correction ability of rateless code and...
High-speed serial data communication is now very popular for connecting various resources in high-performance computing systems. In such high-speed serial links, a line coding is important to control the run length (RL) and the running disparity (RD), because a large run length causes insufficient transitions on data-links that make it difficult to perform reliable clock and data recovery (CDR), and...
The paper analyses nonconformities in norms, requirements and regulations, which demonstrates that standardization is a crucial factor for quality assurance. It is pointed out that the absence of risk level analysis for each nonconformity is an important drawback of a modern classification.
The need of developing reliable industrial automation networks has increased to a great extent due to the transmission of hard real time control packets over error prone wireless channels. This paper focuses on error control approaches to satisfy strict reliability requirements of industrial automation control applications. In this paper, some of the state of art error control approaches are critically...
In this paper, the problem of securely computing a function over the binary modulo-2 adder multiple-access wiretap channel is considered. The problem involves a legitimate receiver that wishes to reliably and efficiently compute a function of distributed binary sources while an eavesdropper has to be kept ignorant of them. In order to characterize the corresponding fundamental limit, the notion of...
The precise spatio-temporal position data of vehicles is useful for most studies, such as wireless link lifetime and node degree in vehicular ad hoc networks. However, due to the system errors and random errors, the existing Global Positioning System (GPS) only provides the positional accuracy about 10m or even worse. In this paper, to address the issue of positional accuracy, a Clustering and Approximating...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.