Wireless Sensor network (WSN) is a low cost and multifunctional emerging technology. Its application ranges from military, health sector, environmental monitoring and industrial application. The maximum benefit of rec...
详细信息
Wireless Sensor network (WSN) is a low cost and multifunctional emerging technology. Its application ranges from military, health sector, environmental monitoring and industrial application. The maximum benefit of recent technology development can be achieved by integration internet (Cloud Computing) and secured real time data collection platform (secured-WSNs). In order to ensure its functionality especially in malicious environments, security mechanisms are essential in WSNs. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. So, for complete security internal attacks need to be handled. In this paper we proposed content-based publish/subscribe (pub/sub) broker model on the Cloud that integrates WSNs to Cloud efficiently and effectively. To secure WSNs we have proposed a new approach for detecting internal attack by using Markov Chain Monte Carlo (MCMC). It is an efficient real time algorithm. It is good for sensor network as it operates with no or incomplete classification information. Our result shows the output of the internal attacker evaluation.
User association is one of the key techniques of the resource management in the heterogeneous cellular networks (HetNets). Interference management plays an important role on the system performance improvement in inter...
详细信息
ISBN:
(纸本)9781479958337
User association is one of the key techniques of the resource management in the heterogeneous cellular networks (HetNets). Interference management plays an important role on the system performance improvement in interference limited cellular networks. In this paper, we address the user association problem from the view of interference management of HetNets. Especially, we consider the co-channel interference from both intra-tier and inter-tier, and propose an interference matrix based user association scheme. We use interference matrix to obtain the leakage plus noise ratio (SLNR) of each users in the HetNets. In the proposed scheme, the optimization problem of user association is modeled jointly taking the SLNR of users and traffic load of base stations into consideration, which gives a tradeoff between interference mitigation and load balancing. A simple but useful heuristic algorithm is given to obtain a suboptimal solution of the user association problem. We give the simulation results of the proposed scheme on the system throughput and user fairness, which can effectively achieve the tradeoff between interference mitigation and load balancing.
The long term evolution (LTE) networks provide high data rate access to support multi-media services at the expense of more power consumption in user equipment (UE). Discontinuous reception (DRX) mechanism is one of t...
详细信息
ISBN:
(纸本)9781467362351
The long term evolution (LTE) networks provide high data rate access to support multi-media services at the expense of more power consumption in user equipment (UE). Discontinuous reception (DRX) mechanism is one of the promising technologies for energy saving in LTE networks, which extends UE battery lifetime effectively. The DRX parameters configuration should make a compromise between power saving and wake-up delay, which can be achieved by the DRX parameters configuration according to different traffic types with specific quality of service (QoS) requirement. In this paper, we model the DRX mechanism with web traffic using a semi-Markov process. Based on the proposed model, the performance of power saving and wake-up delay with various DRX parameters is analysed, which provides insight on effects of the DRX parameters on the power saving and wake-up delay performance. The analytical results are verified by the simulation, which shows that LTE DRX achieves much power saving gains at the cost of tolerable delay.
In order to optimize power utilization of relay nodes in cooperative communication,a power allocation algorithm with objective function to maximize system capacity is *** on the convex optimization theory,an ellipsoid...
详细信息
In order to optimize power utilization of relay nodes in cooperative communication,a power allocation algorithm with objective function to maximize system capacity is *** on the convex optimization theory,an ellipsoid algorithm is used to solve this problem,which could simplify the subgradient choosing steps and improve convergence stability,so that an optimized power allocation algorithm is *** analysis and simulation results show that the algorithm can effectively distribute the power of each node with lower complexity,and ensure the transmission capability of relay nodes in cooperative communication.
This paper proposes a relay selection scheme based on geometric optimum principle to maximize the cognitive link' s connectivity with limited interference to primary user in cooperative cognitive systems. A dual-hop ...
详细信息
This paper proposes a relay selection scheme based on geometric optimum principle to maximize the cognitive link' s connectivity with limited interference to primary user in cooperative cognitive systems. A dual-hop cognitive relay system is considered, in which the channel impulse response follows independent non-identical distribution (i. n. d. ) each hop, such as Rician, Rayleigh and Nakagami-m distribution. Then, closed-form expressions in terms of outage probability and average bit error rate (ABER) are obtained using amplify-and-forward (AF) relaying protocol over such mixed fading channels. Furthermore, the best range of the relay is derived. Extensive simulation re- suits are conducted to verify the theoretical analysis, which is useful to the network optimal design.
A major challenge in network virtualization environment is how to fairly and efficiently allocate the various sacred physical resources of infrastructure providers among multiple virtual networks. In this paper, we pr...
详细信息
In spite of great efforts to expand the network infrastructure, it is still hard to catch the rapid growing need to serve tremendous subscribers with significant traffic. To effectively allocate the resource among mob...
详细信息
ISBN:
(纸本)9781479964123
In spite of great efforts to expand the network infrastructure, it is still hard to catch the rapid growing need to serve tremendous subscribers with significant traffic. To effectively allocate the resource among mobile telecommunication operators and Internet Service Providers (ISP), grasping the highly dynamic traffic patterns can enable effective network planning and optimization for state-of-the-art mobile Internet. We employ traffic behavior analysis method to analyze and model the Internet traffic. Due to the subscribers' number of streaming media accounting over 60% of the entire traffic, we conduct a complete study to analyze this kind of traffic. By contrast, we also give the analysis result of another application, Instant Message (IM). Applying our newly proposed clustering methodology, we describe the regional characteristic of applications. This research subsequently enables more subtle and efficient mobile Internet operating modes to benefit operators and ISPs.
An optimized routing protocol is designed based on selection region for cognitive radio ad hoc networks. A closed-form expression of the expected density of progress (EDoP) is given by modeling secondary network overl...
详细信息
This paper characterizes the spatially-normalized degrees of freedom (DoF) of a 2-cell, 3-user per cell multiple input multiple output (MIMO) cellular networks with M antennas at each user and N antennas at each base ...
详细信息
Physical layer network coding (PNC) exploits the broadcast nature of wireless channel to obtain transmission efficiency gains. This paper proposes a hybrid field physical layer network coding (HFNC) approach and apply...
详细信息
ISBN:
(纸本)9781849198196
Physical layer network coding (PNC) exploits the broadcast nature of wireless channel to obtain transmission efficiency gains. This paper proposes a hybrid field physical layer network coding (HFNC) approach and applys HFNC to the multi-user relay networks. The proposed method enables a reliable transmission with variable throughput under different signal-to-noise ratios (SNR). With given constellation rotations at sources, the points of the equivalent superpositioned (ESP) constellation cluster. The HFNC-based decoding can be divided into two layers. Point-level (PL) decoding over the complex-field achieves a higher throughput as complex field network coding (CFNC), while cloud-level decoding defined in the finite-field is able to resist bad channel with a lower throughput. Excellent performances of symbol error probability (SEP) and transmission efficiency are proved by both theoretical analysis and simulation results.
暂无评论