Over the last few year, operators have migrate to broadband IP infrastructures offering a broad range of rich-media content to mobile users, anywhere and anytime. Nevertheless, this is not true for the emergency commu...
详细信息
ISBN:
(纸本)9781538631805
Over the last few year, operators have migrate to broadband IP infrastructures offering a broad range of rich-media content to mobile users, anywhere and anytime. Nevertheless, this is not true for the emergency communications, which until now are relying on legacy telecommunication technologies, unable to fulfill the nextgeneration regulatory requirements. For the emergency communication platforms and services to cope with the cataclysmic changes that the 5G era is bringing along, a swift change is required in terms of incorporating mission critical IoT communications, massive machine-type communication and Gigabit mobile connectivity. In particularly, remote health care and sensor-triggered emergency communications are proposed as prominent enablers for nextgeneration emergency platforms. In this paper a test-bed evaluation of the nextgeneration emergency communication platform, part of the EU funded "EMYNOS" project is presented and discussed. Specifically, the study focuses on the efficiency of the SIP SUBSCRIBE/NOTIFY methods across the "EMYNOS" emergency services IP network, when applied for updating the sensory data provided through an API, which handles sensor-based health monitoring data to the first responders and emergency services (i.e, ambulance, fire-brigade, police, etc.) The black-box and white-box testing reveals promising results, placing the proposed architecture among the candidates for the nextgeneration emergency communications platforms.
Secure communication of the location information or localization of sensor nodes in an adversarial environment is a high priority yet a challenging task. Wireless sensornetworks are characterized by severe constraint...
详细信息
ISBN:
(纸本)9780769537863
Secure communication of the location information or localization of sensor nodes in an adversarial environment is a high priority yet a challenging task. Wireless sensornetworks are characterized by severe constraints such as memory, energy, processing and operational environment. Unlike other wireless networks, a sensor network has to be highly sensitive to energy consumption. Complexity and power consumption of sensor nodes must be as low as possible. A light-weight and secure localization mechanism is needed to optimize the WSN performance from a security perspective. In this paper we present a two-way "Greet, Meet and Locate" mechanism for secure location estimation in large scale wireless sensornetworks based on geographical sectorization. A double-averaging mechanism is also presented that uses a time of arrival (TOA) based localization technique to help minimize the location estimation errors.
The bandwidth of nextgeneration access networks will require beyond that of current optical access, handling the big data to download of huge data, images, and videos, as well as to upload a large number of sensor da...
详细信息
ISBN:
(纸本)9780819499202
The bandwidth of nextgeneration access networks will require beyond that of current optical access, handling the big data to download of huge data, images, and videos, as well as to upload a large number of sensor data, any time and anywhere. The technical convergence with wired and wireless plays an important role to achieve the nextgeneration access networks. In this paper, we show the perspective on nextgeneration access networks considering the resilience against disasters.
Handover (or handoff) management is the set of actions that allows a wireless network to maintain a mobile user's connection as it moves through different cells during a call. The handover is typically done during...
详细信息
ISBN:
(纸本)9780819469335
Handover (or handoff) management is the set of actions that allows a wireless network to maintain a mobile user's connection as it moves through different cells during a call. The handover is typically done during a cell boundary crossing and all of the mobile terminal's connection information must be transferred into the new cell (or new base station). So, it is important to count the number of handovers made by a user during a call for proper network resources dimensioning and performance prediction. Location management is the set of actions aimed to find the current location of an inactive mobile user for call delivery. It implies the transmission of signaling messages for dynamic databases updates, paging, and so on. This problem is formulated in terms of cost optimization and it is mathematically related to handover counting. In this paper, we summarize many of the proposed model to deal with these problems, and we will be mainly focussed on the renewal process approach.
Data aggregation is an important feature in wireless sensornetworks (WSN), where data inputs at an aggregator node are merged to produce compact small output data, thus reducing the network's transmission overhea...
详细信息
ISBN:
(纸本)9780769528786
Data aggregation is an important feature in wireless sensornetworks (WSN), where data inputs at an aggregator node are merged to produce compact small output data, thus reducing the network's transmission overhead and preserving the scarce-battery resources of sensors. Unfortunately, if not secured against attackers, data aggregation can produce erroneous results, which can induce the network operator to take wrong decisions. In this paper, we present a secure aggregation protocol for cluster-based WSN, which is adapted to a large variety of aggregation functions, and which does not rely on trusted aggregator nodes. The inherent transmission overhead is even smaller than in other secure aggregation protocols.
After the East Japan Great Earthquake, the construction of resilient network has been strongly required. On the other hand, the technical convergence with wired and wireless plays an important role to achieve the next...
详细信息
ISBN:
(纸本)9781628414776
After the East Japan Great Earthquake, the construction of resilient network has been strongly required. On the other hand, the technical convergence with wired and wireless plays an important role to achieve the nextgeneration access networks beyond bandwidth of current optical access. In this paper, we discuss nextgeneration resilient access networks, handling the download of huge data, images, and videos, as well as to upload of a large number of sensor data, any time and anywhere.
Peer-to-Peer (P2P) systems are currently receiving considerable interest. However, as experience with P2P networks shows, the selfish behaviors of peers may lead to serious problems of P2P network, such as free-riding...
详细信息
ISBN:
(纸本)9780819469335
Peer-to-Peer (P2P) systems are currently receiving considerable interest. However, as experience with P2P networks shows, the selfish behaviors of peers may lead to serious problems of P2P network, such as free-riding and white-washing. In order to solve these problems, there are increasing considerations on reputation system design in the study of P2P networks. Most of the existing works is concerning probabilistic estimation or social networks to evaluate the trustworthiness for a peer to others. However, these models can not be efficient all the time. In this paper, our aim is to provide a general mechanism that can maximize P2P networks social welfare in a way of Vickrey-Clarke-Groves family, while assuming every peer in P2P networks is rational and selfish, which means they only concern about their own outcome. This mechanism has some desirable properties using an O(n) algorithm: (1) incentive compatibility, every peer truly report its connection type;(2) individually rationality;and (3) fully decentralized, we design a multiple-principal multiple-agent model, concerning about the service provider and service requester individually.
Building a semantic search system on top of peer-to-peer (P2P) networks is becoming an attractive and promising alternative scheme for the reason of scalability, Data freshness and search cost. In this paper, we prese...
详细信息
ISBN:
(纸本)9780819469335
Building a semantic search system on top of peer-to-peer (P2P) networks is becoming an attractive and promising alternative scheme for the reason of scalability, Data freshness and search cost. In this paper, we present a Suffix Arrays based algorithm for Semantic Search (SASS) in P2P systems, which generates a distributed Semantic Overlay Network (SONs) construction for full-text search in P2P networks. For each node through the P2P network, SASS distributes document indices based on a set of suffix arrays, by which clusters are created depending on words or phrases shared between documents, therefore, the search cost for a given query is decreased by only scanning semantically related documents. In contrast to recently announced SONs scheme designed by using metadata or predefined-class, SASS is an unsupervised approach for decentralized generation of SONs. SASS is also an incremental, linear time algorithm, which efficiently handle the problem of nodes update in P2P networks. Our simulation results demonstrate that SASS yields high search efficiency in dynamic environments.
When designing dependable communication systems for industrial application scenarios, the application environment where the solution will be integrated plays a crucial role. This study demonstrates how simulations can...
详细信息
ISBN:
(纸本)9781728174921
When designing dependable communication systems for industrial application scenarios, the application environment where the solution will be integrated plays a crucial role. This study demonstrates how simulations can be used to integrate a target environment in the design process from an early stage. This allows to optimize wireless sensornetworks (WSNs) in specific environments in terms of hardware requirements (e.g. antenna) and topology. The article discusses several application scenarios within the 2.4 GHz band and demonstrates how the design process can be aided by simulation to achieve dependable communication in harsh environments.
Within the broader context of the Adaptive Risk Management (ARM) Platform described in [27], the aim of this work is to show practically a proof of concept for a network architecture based on mobile code for Weiser...
详细信息
ISBN:
(纸本)9781424407835
Within the broader context of the Adaptive Risk Management (ARM) Platform described in [27], the aim of this work is to show practically a proof of concept for a network architecture based on mobile code for Weiser's vision of ubiquitous computing [261 and opportunistic computing [22]. The proposed paradigm which animates the Opportunistic communication Module (OCM) of the ARM Platform enhances both mobile and wireless sensornetworks by leveraging on each other and will serve as a foundation for future investigation of interdependencies among heterogeneous large scale networks [7] while supporting our efforts to engineer eNetworked industrial ecosystems.
暂无评论