Wireless Sensor network (WSN) is a low cost and multifunctional emerging technology. Its application ranges from military, health sector, environmental monitoring and industrial application. The maximum benefit of rec...
详细信息
Wireless Sensor network (WSN) is a low cost and multifunctional emerging technology. Its application ranges from military, health sector, environmental monitoring and industrial application. The maximum benefit of recent technology development can be achieved by integration internet (Cloud Computing) and secured real time data collection platform (secured-WSNs). In order to ensure its functionality especially in malicious environments, security mechanisms are essential in WSNs. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. So, for complete security internal attacks need to be handled. In this paper we proposed content-based publish/subscribe (pub/sub) broker model on the Cloud that integrates WSNs to Cloud efficiently and effectively. To secure WSNs we have proposed a new approach for detecting internal attack by using Markov Chain Monte Carlo (MCMC). It is an efficient real time algorithm. It is good for sensor network as it operates with no or incomplete classification information. Our result shows the output of the internal attacker evaluation.
The services carried by the Internet have undergone tremendous change over the past decades, along with the emergence of multimedia services and cloud computing, etc. However, there is little change in the framework o...
详细信息
The services carried by the Internet have undergone tremendous change over the past decades, along with the emergence of multimedia services and cloud computing, etc. However, there is little change in the framework of network designed primarily for reliable end-to-end communication, which is not suitable for these new services, resulting in poor performance of services and inefficient utilization of network resource. In this paper, we propose a network resource allocation scheme base on SDN(Software Defined network) an emerging network paradigm, to provide Quality of Service(Qo S) support for various services while balance the link load in the network avoiding congestion and idleness. And we demonstrate its performance via experiments under our SDN test bed.
Mobility pattern of users is decided by people themselves. However, in the daily life, mobile users often repeat regular routes in certain periods. To effectively mine the mobile rules of users and allocate the resour...
详细信息
Mobility pattern of users is decided by people themselves. However, in the daily life, mobile users often repeat regular routes in certain periods. To effectively mine the mobile rules of users and allocate the resource among mobile telecommunication operators and Internet Service Providers(ISP), grasping the models of human mobility can enable effective network planning and advertisement recommending. In this paper, we employ Apriori algorithm method to mine mobile users’ movement model. The algorithm proposed is based on mining the mobility patterns of users, forming mobility rules from these patterns, and finally predicting a mobile user’s next movement by using the mobility rules. The user mobility patterns are mined from the history of mobile user trajectories. In addition to the analysis of individual mobile behavior, it is possible to mine population movement regularity from a large number of user mobile patterns. By studying the group characteristics the place that a large number of users accessed can be found. Operators can optimize the setting of the base station according to the density of users to meet the needs of mobile users.
Mobile crowdsensing (MCS) has appeared as a viable solution for data gathering in Internet of Vehicle (IoV). As it utilizes plenty of mobile users to perform sensing tasks, the cost on sensor deployment can be reduced...
详细信息
ISBN:
(数字)9781728199160
ISBN:
(纸本)9781728192369
Mobile crowdsensing (MCS) has appeared as a viable solution for data gathering in Internet of Vehicle (IoV). As it utilizes plenty of mobile users to perform sensing tasks, the cost on sensor deployment can be reduced and the data quality can be improved. However, there exist two main challenges for the IoV-based MCS, which are the privacy issues and the existence of malicious vehicles. In order to solve these two challenges simultaneously, we propose a privacy-protecting reputation management scheme in IoV-based MCS. In particular, our privacy-protecting scheme can execute quickly since its complexity is extremely low. The reputation management scheme considers vehicle's past behaviors and quality of information. In addition, we introduced time fading into the scheme, so that our scheme can detect the malicious vehicles accurately and quickly. Moreover, latency in the IoV must be exceedingly low. With the help of the mobile edge computing (MEC) which is deployed on the base station side and has powerful computing capability, the latency can be greatly reduced to meet the requirements of the IoV. Simulation results demonstrate effectiveness of our reputation management scheme in resisting malicious vehicles, which can assess the reputation value accurately and detect the malicious vehicles quickly while protecting the privacy.
Reducing the energy consumption of cellular wireless access networks is not only beneficial for the global environment but also makes commercial sense for telecommunication operators, our research focus on how to put ...
详细信息
ISBN:
(纸本)9781467392013
Reducing the energy consumption of cellular wireless access networks is not only beneficial for the global environment but also makes commercial sense for telecommunication operators, our research focus on how to put forward a constructive energy saving method in the precondition of guaranteed service quality for customer. In this paper, we based on the signaling data and location data coming from one of Chinese main operator's customers, trying to analysis the law that with the increase of users in a district, how their demand for energy change. Through the use of the law, operators can make a basis when conducting the construction of the base station at the time of city expansion and the redundancy phenomenon of construction of base station can be effectively reduced and then make contributions to energy saving, the law can also be used to provide a reference for city Planning Bureau when they conducting the urban planning and the construction of Green city and then get the purpose of optimal allocation of resources. In our study, we carry out the statistics of 1558053 users from Chongqing city, finally we found that with the increase of customer' number of each special district, the number of total traffic in the city present a change of power function.
With the development of mobile communication and industrial internet technologies, the demand for robust absolute time synchronization based on network for diverse scenarios is significantly growing. TAP is a novel ne...
详细信息
Future networks need to get knowledge of users' requirements by analyzing big data to achieve intelligence. OpenFlow is the first standard communications interface defined between the control and forwarding layers...
详细信息
Future networks need to get knowledge of users' requirements by analyzing big data to achieve intelligence. OpenFlow is the first standard communications interface defined between the control and forwarding layers of a SDN architecture. So as to enhance network flexibility and availab.lity, this paper presents a network resource allocation scheme equipped with the ability of user preference awareness, by connecting a cloud platform of analyzing users' data. We use the Hadoop platform to predict the rate and type of the incoming flows and employ them to get the lightest burden link through the LARAC algorithm. It has been verified on the BUPT SDN test bed that this system is capable of allocating the network resources dynamically by predicting the network load in advance. The results show that the proposed methods achieve better load balance than previous networks.
This paper proposes a periodic double ring strip frequency selective surface (FSS) with dual-band stop behavior. The FSS elements are designed to be etched on the transparent coating of glass substrate in smart buildi...
详细信息
ISBN:
(纸本)9781467374422
This paper proposes a periodic double ring strip frequency selective surface (FSS) with dual-band stop behavior. The FSS elements are designed to be etched on the transparent coating of glass substrate in smart buildings, which acts as a dual-band notch filter on 2.45GHz and 5.4GHz to avoid the leakage of WiFi signal outside the building. All the simulation parts are simulated by using High Frequency Structure Simulator (HFSS). The proposed FSS possesses 450MHz and 960MHz bandwidth with insertion loss more than -10dB around the two central operating frequencies 2.45GHz and 5.45GHz, respectively. Furthermore, the unit-cell structure provides a stable performance for both TE and TM polarizations with incident angles 0°-60°. A prototype of the proposed FSS is fabricated and measured. Good agreement between the simulated and measured results is obtained.
Exponentially growing demand on mobile data facilitates the need to increase spectrum efficiency and also to gain access to additional spectrum bands. LTE-U provides a way for LTE service to be provided, in some regul...
详细信息
ISBN:
(纸本)9781509038442
Exponentially growing demand on mobile data facilitates the need to increase spectrum efficiency and also to gain access to additional spectrum bands. LTE-U provides a way for LTE service to be provided, in some regulatory areas, using a combination of licensed and unlicensed spectrum. In this paper, we consider the resource allocation problem in LTE-U networks with downlink-uplink decoupling (DUDe) technique. Here, the spectrum allocation problem is formulated as a game theoretic model which incorporates user association, spectrum allocation, and load balancing. We propose a decentralized expected Q-learning algorithm to solve this game. Using the proposed algorithm, the base stations can autonomously choose their optimal spectrum allocation schemes based on only limited information from the networks. It is shown that the proposed algorithm converges to a stationary mixed-strategy distribution which constitutes a mixed strategy Nash equilibrium for the studied game. Simulation results show the proposed Q-learning algorithm yields up to 12.7% and 51.1% improvement in terms of total rate, compared to traditional Q-learning and nearest neighbor algorithms, respectively. Furthermore, it is shown that the proposed Q-learning algorithm always converges to a mixed Nash equilibrium, and need 19% less time to coverage compared to traditional Q-learning.
Software-Defined networking (SDN) is an innovative and programmable networking architecture, representing the direction of the future network evolution. In this paper, we propose an architecture to introduce traffic c...
详细信息
Software-Defined networking (SDN) is an innovative and programmable networking architecture, representing the direction of the future network evolution. In this paper, we propose an architecture to introduce traffic classification techniques into the OpenFlow-based SDN network, which enables the network to be application-aware, so the network could distinguish various applications flows and know the requirements of different flows. Our new architecture also take advantage of the new intelligence to make the network forward traffic flows based flows' demands on bandwidth and delay, which could improve Quality of Service (QoS) of applications and optimize resource allocation all over the network.
暂无评论