Search results for " networking"

showing 10 items of 1264 documents

Reducing Overhearing Energy in Wake-Up Radio-Enabled WPANs: Scheme and Performance

2018

Wake-up Radio (WuR)-enabled wireless personal area networks (WPANs) are more popular over conventional WPANs thanks to WuR's on-demand transmission feature and overwhelming energy consumption superiority. In a WuRenabled WPAN, overhearing occurs when a wake-up receiver decodes and validates the address of a wake-up call which is not intended to it. However, such overhearing consumes a portion of the required reception energy for unintended nodes. To diminish overhearing thus conserve total reception energy in a network, we propose a bit-by-bit address decoding (BBAD) scheme and compare it with another addressing scheme for WuR that uses a micro-controller unit to decode and match the whole …

Scheme (programming language)Computer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS010401 analytical chemistryTestbed020206 networking & telecommunications02 engineering and technologyEnergy consumption01 natural sciences0104 chemical sciencesTransmission (telecommunications)0202 electrical engineering electronic engineering information engineeringWirelessbusinesscomputerEnergy (signal processing)Decoding methodsComputer networkcomputer.programming_language2018 IEEE International Conference on Communications (ICC)
researchProduct

UAV Communication Strategies in the Next Generation of Mobile Networks

2020

| openaire: EC/H2020/857031/EU//5G!Drones The Next Generation of Mobile Networks (NGMN) alliance advocates the use of different means to support vehicular communications. This aims to cope with the massive data generated by these devices which could affect the Quality of Service (QoS) of the associated applications, but also the overall operation carried out by the vehicles. However, efficient communication strategies must be considered in order to select, for each vehicle, the communication mean ensuring the best QoS. In this paper, we tackle this issue and we propose efficient communication strategies for Unmanned Aerial Vehicles (UAVs). In addition to direct UAV-to-Infrastructure communi…

Scheme (programming language)Computer sciencebusiness.industryQuality of serviceNode (networking)05 social sciencesComputerApplications_COMPUTERSINOTHERSYSTEMS050801 communication & media studies020206 networking & telecommunications02 engineering and technologySpectral efficiencylaw.inventionUAV-to-Infrastructure (U2I)0508 media and communicationsRelaylawUAV-to-UAV (U2U)0202 electrical engineering electronic engineering information engineeringbusinessMobile NetworksUnmanned Aerial Vehicles (UAVs)computerComputer networkcomputer.programming_language
researchProduct

Blockchain Based Delegatable Access Control Scheme for a Collaborative E-Health Environment

2018

Modern electronic healthcare (e-health) settings constitute collaborative environments requiring sophisticated fine-grained access control mechanisms to cater their access demands. Access delegatability is quite crucial to realize fine-grained, flexible access control schemes compatible with such environments. In this paper, we addressed this issue through proposing an attribute based access control scheme integrated with controlled access delegation capabilities suitable for a multi-domain e-health environment. We have utilized the blockchain technology to manage attribute assignments, delegations as well as revocations. The scheme enables delegations in a controlled manner without jeopard…

Scheme (programming language)DelegationRevocationbusiness.industryComputer sciencemedia_common.quotation_subject010401 analytical chemistryControl (management)Overhead (engineering)020206 networking & telecommunicationsAccess control02 engineering and technologyAttribute-based access controlComputer securitycomputer.software_genre01 natural sciences0104 chemical sciences0202 electrical engineering electronic engineering information engineeringInformationSystems_MISCELLANEOUSbusinessKey managementcomputermedia_commoncomputer.programming_language2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)
researchProduct

5G Functional Architecture and Signaling Enhancements to Support Path Management for eV2X

2019

Enhanced vehicle-to-everything (eV2X) communication is one of the most challenging use cases that the fifth generation (5G) of cellular mobile communications must address. In particular, eV2X includes some 5G vehicular applications targeting fully autonomous driving which require ultra-high reliability. The usual approach to providing vehicular communication based on single-connectivity transmission, for instance, through the direct link between vehicles (PC5 interface), often fails at guaranteeing the required reliability. To solve such a problem, in this paper, we consider a scheme where the radio path followed by eV2X messages can be proactively and dynamically configured to either trans…

Scheme (programming language)General Computer ScienceComputer scienceDistributed computingInterface (computing)Reliability (computer networking)02 engineering and technology0202 electrical engineering electronic engineering information engineeringGeneral Materials ScienceUse casecomputer.programming_languageMulti-connectivitybusiness.industryGeneral Engineering020206 networking & telecommunications5G coreTransmission (telecommunications)Path (graph theory)V2Xsidelink020201 artificial intelligence & image processinglcsh:Electrical engineering. Electronics. Nuclear engineeringMobile telephonybusinesslcsh:TK1-9971computer5GIEEE Access
researchProduct

Priority-based initial access for URLLC traffic in massive IoT networks: Schemes and performance analysis

2020

Abstract At a density of one million devices per square kilometer, the10’s of billions of devices, objects, and machines that form a massive Internet of things (mIoT) require ubiquitous connectivity. Among a massive number of IoT devices, a portion of them require ultra-reliable low latency communication (URLLC) provided via fifth generation (5G) networks, bringing many new challenges due to the stringent service requirements. Albeit a surge of research efforts on URLLC and mIoT, access mechanisms which include both URLLC and massive machine type communications (mMTC) have not yet been investigated in-depth. In this paper, we propose three novel schemes to facilitate priority-based initial …

Scheme (programming language)Service (systems architecture)Computer Networks and CommunicationsComputer sciencebusiness.industryReliability (computer networking)Frame (networking)020206 networking & telecommunications02 engineering and technologyTransmission (telecommunications)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingLatency (engineering)businesscomputerVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 5505GRandom accesscomputer.programming_languageComputer network
researchProduct

Optimal Buffer Resource Allocation in Wireless Caching Networks

2019

Wireless caching systems have been exhaustively investigated in recent years. Due to limited buffer capacity, and unbalanced arrival and service rates, the backlogs may exist in the caching node and even cause buffer overflow. In this paper, we first investigate the relationship among backlogs, buffer capacity, data arrival rate and service rate, utilizing the martingale theory which is flexible in handling any arrival and service processes. Then given a target buffer overflow probability, the minimal required buffer portion is determined. If the devoted buffer capacity can fulfill all serving users' minimal buffer requirements, an optimization problem is constructed with the objective to m…

Scheme (programming language)Service (systems architecture)Hardware_MEMORYSTRUCTURESOptimization problembusiness.industryComputer scienceNode (networking)020302 automobile design & engineering020206 networking & telecommunications02 engineering and technologyoptimal buffer resource allocationwireless caching networksBuffer (optical fiber)langaton tiedonsiirto0203 mechanical engineeringoptimointi0202 electrical engineering electronic engineering information engineeringResource allocation (computer)Wirelessbusinesscomputerlangattomat verkotBuffer overflowComputer networkcomputer.programming_language
researchProduct

A symbolic distributed event detection scheme for Wireless Sensor Networks

2016

Due to the possibility of extensive and pervasive deployment of many tiny sensor devices in the area of interest, Wireless Sensor Networks (WSNs) result particularly suitable to detect significant events and to react accordingly in industrial and home scenarios. In this context, fuzzy inference systems for event detection in WSNs have proved to be accurate enough in treating imprecise sensory readings to decrease the number of false alarms. Besides reacting to event occurrences, the whole network may infer more information to enrich the event semantics resulting from reasoning processes carried out on the individual nodes. Contextual knowledge, including spatial and temporal relationships, …

Scheme (programming language)Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniComputer scienceProcess (engineering)Event (computing)020208 electrical & electronic engineeringEvent DetectionForth020206 networking & telecommunicationsContext (language use)02 engineering and technologySymbolic Processingcomputer.software_genreDistributed SystemSoftware deployment0202 electrical engineering electronic engineering information engineeringData miningWireless sensor networkcomputerWireless Sensor Networkcomputer.programming_language
researchProduct

An attribute based access control scheme for secure sharing of electronic health records

2016

Electronic health records (EHRs) play a vital role in modern health industry, allowing the possibility of flexible sharing of health information in the quest of provisioning advanced and efficient healthcare services for the users. Although sharing of EHRs has significant benefits, given that such records contain lot of sensitive information, secure sharing of EHRs is of paramount importance. Thus, there is a need for the realization of sophisticated access control mechanisms for secure sharing of EHRs, which has attracted significant interest from the research community. The most prominent access control schemes for sharing of EHRs found in literature are role based and such solutions have…

Scheme (programming language)business.industryComputer scienceInternet privacy020206 networking & telecommunications020207 software engineeringProvisioningAccess control02 engineering and technologyComputer securitycomputer.software_genreInformation sensitivityResource (project management)Health care0202 electrical engineering electronic engineering information engineeringComputingMilieux_COMPUTERSANDSOCIETYbusinesscomputerSelective disclosurecomputer.programming_languageDrawback2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)
researchProduct

An Efficient Multi-Show Unlinkable Attribute Based Credential Scheme for a Collaborative E-Health Environment

2017

Modern electronic healthcare (e-health) systems constitute collaborative environments in which patients' private health data are shared across multiple domains. In such environments, patients' privacy can be violated through the linkability of different user access sessions over patient health data. Therefore, enforcing anonymous as well as multi-session unlinkable access for the users in e-health systems is of paramount importance. As a way of achieving this requirement, more emphasis has been given to anonymous attribute credentials, which allows a user to anonymously prove the ownership of a set of attributes to a verifier and thereby gain access to protected resources. Among the existin…

Scheme (programming language)business.industryProperty (programming)Computer science020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreCredentialHealth dataSet (abstract data type)020204 information systemsHealth care0202 electrical engineering electronic engineering information engineeringComputingMilieux_COMPUTERSANDSOCIETYThe Internetbusinesscomputercomputer.programming_language2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)
researchProduct

Elliptic Curve-Based Secure Multidimensional Aggregation for Smart Grid Communications

2017

In smart grid, data aggregation is considered as an essential paradigm in assessing information about current energy usage. To achieve the privacy-preserving goal, several homomorphic-based solutions have been proposed. However, these solutions either consider one-dimensional information or use costly pairing computation in order to ensure source authentication. In fact, smart grid data are likely to be multidimensional (e.g., time, purpose, and so on) for more accurate control. In addition, the aggregation node in smart grid needs to verify data that come from several smart meters in a residential area; hence, the verification must be cost-efficient. In this paper, we propose a scheme that…

Scheme (programming language)geographyTheoretical computer sciencegeography.geographical_feature_categoryComputer sciencebusiness.industryDistributed computingNode (networking)020208 electrical & electronic engineeringHomomorphic encryption020206 networking & telecommunications02 engineering and technologyEncryptionResidential areaSmart grid0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringElliptic curve cryptographybusinessInstrumentationcomputercomputer.programming_languageIEEE Sensors Journal
researchProduct