Search results for " Internet."
showing 10 items of 1215 documents
ACT-MAC: An asynchronous cooperative transmission MAC protocol for WSNs
2014
Duty cycling (DC) has been proven to be an efficient mechanism to reduce energy consumption in wireless sensor networks (WSNs). On the other hand, cooperative transmission (CT) enables longer range transmission to hop over an energy-hole node, resulting in more balanced energy consumption among nodes. In the literature, there exist few CT MAC protocols for DC operated WSNs and these protocols rely on fixed cycle length. In this paper, we propose a novel variable cycle length protocol, namely asynchronous cooperative transmission medium access control (ACT-MAC), which contains both features of reducing the unnecessary idle listening by DC and mitigating the energy-hole by making use of CT. T…
Security Challenges of IoT-Based Smart Home Appliances
2018
The Internet of Things, IoT, and the related security challenges are reaching homes in the form of smart appliances. If the appliances are compromised, they can be used in botnet attacks against Internet services and potentially cause harm to people and property through the local network, for example, by heating up too much or allowing unauthorized access. The aim of this study was to see how secure these devices are against remote and network attacks. Several devices were tested with attacks coming from the same Wi-Fi network to gain various levels of control of the devices. Their security against a Man-in-the-Middle attack was also studied to see differences in the susceptibility to conne…
Kalman filter estimation of the contention dynamics in error-prone IEEE 802.11 networks
2008
In the last years, several strategies for maximizing the throughput performance of IEEE 802.11 networks have been proposed in literature. Specifically, it has been shown that optimizations are possible both at the medium access control (MAC) layer, and at the physical (PHY) layer. In fact, at the MAC layer, it is possible to minimize the channel wastes due to collisions and backoff expiration times, by tuning the minimum contention window as a function of the number n of competing stations. At the PHY layer, it is possible to improve the transmission robustness, by selecting a suitable modulation/coding scheme as a function of the channel quality perceived by the stations. However, the feas…
Energy-Efficient M2M Communications in for Industrial Automation
2020
M2M communication with autonomous data acquisition and exchange plays a key role in realizing the “control”-oriented tactile Internet (TI) applications such as industrial automation. In this chapter, we develop a two-stage access control and resource allocation algorithm. In the first stage, we introduce a contract-based incentive mechanism to motivate some delay-tolerant machine-type communication (MTC) devices to postpone their access demands in exchange for higher access opportunities. In the second stage, a long-term cross-layer online resource allocation approach is based on Lyapunov optimization, which jointly optimizes rate control, power allocation, and channel selection without pri…
Reliable Underlay Device-to-Device Communications on Multiple Channels
2019
Device-to-device (D2D) communications provide a substantial increase in spectrum usage and efficiency by allowing nearby users to communicate directly without passing their packets through the base station (BS). In previous works, proper channel assignment and power allocation algorithms for sharing of channels between cellular users and D2D pairs, usually require exact knowledge of the channel-state-information (CSI). However, due to the non-stationary wireless environment and the need to limit the communication and computation overheads, obtaining perfect CSI in the D2D communication scenario is generally not possible. In this work, we propose a joint channel assignment and power allocati…
Uplink DPCCH Gating of Inactive UEs in Continuous Packet Connectivity Mode for HSUPA
2007
In order to further improve the packet performance in the UMTS FDD system, uplink dedicated physical control channel (DPCCH) gating as a scheme is proposed in 3GPP under the work item "continuous connectivity for packet data users". In this paper, the uplink DPCCH gating concept is described and analyzed on both a qualitative and a quantitative level. And the system performance of different gating patterns used in the scheme was investigated by analytical prediction and system level simulations with different channel profiles. As shown, the selection of the gating pattern has a significant influence on the system performance, which is correlated with the uplink data transmission activity an…
Cooperative or non-cooperative transmission in synchronous DC WSNs: A DTMC-based approach
2017
Cooperative transmission (CT) enables balanced energy consumption among sensor nodes and mitigates the energy hole problem in wireless sensor networks (WSNs). In typical CT enabled medium access control (MAC) protocols, a source node decides to trigger CT or not based on a residual energy comparison between itself and its relay node. In this paper, we propose a receiver initiated CT MAC protocol, in which the receiving node makes the decision on initiating CT or not based on a tradeoff between performing CT and non-CT. In this way, nodes can avoid idle listening and achieve an extended lifetime. A discrete-time Markov chain (DTMC) model is developed to analyze the performance of CT associat…
Energy-Efficient Binary Power Control with Bit Error Rate Constraint in MIMO-OFDM Wireless Communication Systems
2012
Motivated by the demand for energy efficiency improvement in mobile communication industry, we explore an idea of optimizing energy efficiency for MIMO-OFDM wireless communication systems while maintaining users' quality of service (QoS) requirement. Based on the binary power control scheme,a power allocation criterion for energy efficiency optimization is derived under the total power constraint. From a bit error rate (BER) point of view, a protection constraint is configured to guarantee the system QoS. With the aim of energy efficiency optimization under QoS guarantee in MIMO-OFDM wireless communication systems, an energy-efficient binary power control with BER constraint (EBPCB) algorith…
Adoption of Constrained Application Protocol
2016
Among billions of Internet enabled devices that are expected to surround us in the near future, many will be resource constrained, i.e., will have limited power supply, processing power and memory. To cope with these limitations, the Constrained Application Protocol (CoAP) has been recently introduced as a lightweight alternative to HTTP for connecting the resource limited devices to the Web. Although the new protocol offers solid technical advantages, it remains uncertain whether a successful uptake will follow, as it depends also on its economic feasibility for the involved stakeholders. Therefore, this paper studies the techno-economic feasibility of CoAP using a systematic methodologica…
Research opportunities in performance measurement in public utilities regulation
2015
Purpose – The purpose of this paper is to propose a method to choose a set of scientific articles about performance measurement in public utilities regulation. The method is designed to identify references with high academic relevance in databases accessed via the internet, and, through these articles, to perform a mapping of these publications and conduct a systemic analysis. Design/methodology/approach – The study is characterized as exploratory and descriptive with a qualitative and quantitative approach. Incorporates an inductive logic, and draws on primary and secondary data sources. The research involves the application of a technical procedure for selection and study of selected art…