Search results for "Computer network"

showing 10 items of 1634 documents

An Anonymous Delegatable Attribute-based Credential Scheme for a Collaborative E-health Environment

2019

We propose an efficient anonymous, attribute-based credential scheme capable of provisioning multi-level credential delegations. It is integrated with a mechanism to revoke the anonymity of credentials for resolving access disputes and making users accountable for their actions. The proposed scheme has a lower end-user computational complexity in comparison to existing credential schemes with delegatability and has a comparable level of performance with the credential standards of U-Prove and Idemix. Furthermore, we demonstrate how the proposed scheme can be applied to a collaborative e-health environment to provide its users with the necessary anonymous access with delegation capabilities.

Scheme (programming language)Computational complexity theoryDelegationComputer Networks and CommunicationsComputer sciencemedia_common.quotation_subject020206 networking & telecommunicationsProvisioning02 engineering and technologyComputer securitycomputer.software_genreCredentialComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS0202 electrical engineering electronic engineering information engineeringComputingMilieux_COMPUTERSANDSOCIETYcomputermedia_commoncomputer.programming_languageAnonymityACM Transactions on Internet Technology
researchProduct

An On-Demand Energy Requesting Scheme for Wireless Energy Harvesting Powered IoT Networks

2018

Energy harvesting (EH) delivers a unique technique for replenishing batteries in Internet of Things (IoT) devices. Equipped with an energy harvesting accessory, EH-enabled sensor nodes/IoT devices ...

Scheme (programming language)Computer Networks and Communicationsbusiness.industryComputer science010401 analytical chemistry020206 networking & telecommunications02 engineering and technologyCommunications system01 natural sciences0104 chemical sciencesComputer Science ApplicationsHardware_GENERALHardware and ArchitectureOn demandSignal Processing0202 electrical engineering electronic engineering information engineeringWireless energy harvestingInternet of ThingsbusinessEnergy harvestingcomputerEnergy (signal processing)Information Systemscomputer.programming_languageComputer networkIEEE Internet of Things Journal
researchProduct

Attribute based access control scheme with controlled access delegation for collaborative E-health environments

2017

Abstract Modern electronic healthcare (e-health) settings constitute collaborative environments with complex access requirements. Thus, there is a need for sophisticated fine-grained access control mechanisms to cater these access demands and thereby experience the full potential of e-health systems. In order to realize a flexible access control scheme, integrating access delegation is of paramount importance. However, access delegation has to be enforced in a controlled manner so that it will not jeopardize the security of the system. In this paper, we addressed this issue through proposing an attribute based access control scheme integrated with controlled access delegation capabilities. …

Scheme (programming language)Computer access controlDelegationRevocationComputer Networks and CommunicationsComputer sciencebusiness.industrymedia_common.quotation_subject020206 networking & telecommunications020207 software engineeringProvisioningAccess control02 engineering and technologyComputer securitycomputer.software_genre0202 electrical engineering electronic engineering information engineeringPhysical accessRole-based access controlSafety Risk Reliability and QualitybusinesscomputerSoftwaremedia_commoncomputer.programming_languageJournal of Information Security and Applications
researchProduct

Reducing Overhearing Energy in Wake-Up Radio-Enabled WPANs: Scheme and Performance

2018

Wake-up Radio (WuR)-enabled wireless personal area networks (WPANs) are more popular over conventional WPANs thanks to WuR's on-demand transmission feature and overwhelming energy consumption superiority. In a WuRenabled WPAN, overhearing occurs when a wake-up receiver decodes and validates the address of a wake-up call which is not intended to it. However, such overhearing consumes a portion of the required reception energy for unintended nodes. To diminish overhearing thus conserve total reception energy in a network, we propose a bit-by-bit address decoding (BBAD) scheme and compare it with another addressing scheme for WuR that uses a micro-controller unit to decode and match the whole …

Scheme (programming language)Computer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS010401 analytical chemistryTestbed020206 networking & telecommunications02 engineering and technologyEnergy consumption01 natural sciences0104 chemical sciencesTransmission (telecommunications)0202 electrical engineering electronic engineering information engineeringWirelessbusinesscomputerEnergy (signal processing)Decoding methodsComputer networkcomputer.programming_language2018 IEEE International Conference on Communications (ICC)
researchProduct

UAV Communication Strategies in the Next Generation of Mobile Networks

2020

| openaire: EC/H2020/857031/EU//5G!Drones The Next Generation of Mobile Networks (NGMN) alliance advocates the use of different means to support vehicular communications. This aims to cope with the massive data generated by these devices which could affect the Quality of Service (QoS) of the associated applications, but also the overall operation carried out by the vehicles. However, efficient communication strategies must be considered in order to select, for each vehicle, the communication mean ensuring the best QoS. In this paper, we tackle this issue and we propose efficient communication strategies for Unmanned Aerial Vehicles (UAVs). In addition to direct UAV-to-Infrastructure communi…

Scheme (programming language)Computer sciencebusiness.industryQuality of serviceNode (networking)05 social sciencesComputerApplications_COMPUTERSINOTHERSYSTEMS050801 communication & media studies020206 networking & telecommunications02 engineering and technologySpectral efficiencylaw.inventionUAV-to-Infrastructure (U2I)0508 media and communicationsRelaylawUAV-to-UAV (U2U)0202 electrical engineering electronic engineering information engineeringbusinessMobile NetworksUnmanned Aerial Vehicles (UAVs)computerComputer networkcomputer.programming_language
researchProduct

Receiver-Initiated Data Collection in Wake-Up Radio Enabled mIoT Networks: Achieving Collision-Free Transmissions by Hashing and Partitioning

2021

To achieve ultra-low energy consumption and decade-long battery lifetime for Internet of Things (IoT) networks, wake-up radio (WuR) appears as an eminent solution. While keeping devices in deep sleep for most of the time, a WuR enabled IoT device can be woken up for data transmission at any time by a wake-up call (WuC). However, collisions happen among WuCs for transmitter-initiated data reporting and among data packets for receiver-initiated data collection . In this article, we propose three novel hashing-based schemes in order to achieve collision-free data transmissions for receiver-initiated data collection. We consider first a simple scenario where all devices in a region of interest …

Scheme (programming language)Data collectionSIMPLE (military communications protocol)Computer Networks and CommunicationsRenewable Energy Sustainability and the Environmentbusiness.industryNetwork packetComputer scienceHash functionVDP::Technology: 500Energy consumptionUploadbusinesscomputercomputer.programming_languageComputer networkData transmission
researchProduct

Efficient and Lightweight Data Integrity Check in In-Networking Storage Wireless Sensor Networks

2009

In In-networking storage Wireless Sensor Networks, sensed data are stored locally for a long term and retrieved on-demand instead of real-time. To maximize data survival, the sensed data are normally distributively stored at multiple nearby nodes. It arises a problem that how to check and grantee data integrity of distributed data storage in the context of resource constraints. In this paper, a technique called Two Granularity Linear Code (TGLC) that consists of Intra-codes and Inter-codes is presented. An efficient and lightweight data integrity check scheme based on TGLC is proposed. Data integrity can be checked by any one who holds short Inter-codes, and the checking credentials is shor…

Scheme (programming language)Distributed databasebusiness.industryComputer scienceDistributed computingContext (language use)Term (time)Data integrityDistributed data storeOverhead (computing)businessWireless sensor networkcomputerComputer networkcomputer.programming_language2009 IEEE International Symposium on Parallel and Distributed Processing with Applications
researchProduct

An analytical model of a new packet marking algorithm for TCP flows: Preliminary insights

2004

In differentiated services networks, packet marking schemes can be devised to differentiate packets belonging to a same TCP flow, with the goal of improving the experienced performance. This paper presents an analytical model for an adaptive packet marking scheme proposed in our previous work. The model combines three specific sub-models aimed at describing i) the TCP sources aggregate ii) the marker, and iii) the network status. Some preliminary simulative results seem to validate the model.

Scheme (programming language)Flowchartbusiness.industryComputer scienceNetwork packetComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTelecommunications serviceTCP tuninglaw.inventionIntelligent NetworkPacket switchingDifferentiated serviceslawbusinesscomputerComputer networkcomputer.programming_language
researchProduct

5G Functional Architecture and Signaling Enhancements to Support Path Management for eV2X

2019

Enhanced vehicle-to-everything (eV2X) communication is one of the most challenging use cases that the fifth generation (5G) of cellular mobile communications must address. In particular, eV2X includes some 5G vehicular applications targeting fully autonomous driving which require ultra-high reliability. The usual approach to providing vehicular communication based on single-connectivity transmission, for instance, through the direct link between vehicles (PC5 interface), often fails at guaranteeing the required reliability. To solve such a problem, in this paper, we consider a scheme where the radio path followed by eV2X messages can be proactively and dynamically configured to either trans…

Scheme (programming language)General Computer ScienceComputer scienceDistributed computingInterface (computing)Reliability (computer networking)02 engineering and technology0202 electrical engineering electronic engineering information engineeringGeneral Materials ScienceUse casecomputer.programming_languageMulti-connectivitybusiness.industryGeneral Engineering020206 networking & telecommunications5G coreTransmission (telecommunications)Path (graph theory)V2Xsidelink020201 artificial intelligence & image processinglcsh:Electrical engineering. Electronics. Nuclear engineeringMobile telephonybusinesslcsh:TK1-9971computer5GIEEE Access
researchProduct

Multi-beam cooperative frequency reuse for coordinated multi-point transmission

2010

Coordinated multi-point (CoMP) joint transmission is considered in the 3rd generation partnership project (3GPP) long term evolution (LTE)-advanced as a key technique to mitigate inter-cell interference and improve the cell-edge performance. To effectively apply CoMP joint transmission, efficient frequency reuse schemes need to be designed to support resource management cooperation among coordinated cells. However, most of the existing frequency reuse schemes are not suitable for CoMP systems due to not considering multi-point joint transmission scenarios in their frequency reuse rules. In addition, the restrictions of frequency resources in those schemes result in a high blocking probabili…

Scheme (programming language)Operations researchComputer Networks and CommunicationsComputer scienceDistributed computingInterference (wave propagation)Blocking (statistics)LTE AdvancedTelecomunicacióTransmission (telecommunications)Signal ProcessingKey (cryptography)Resource managementThroughput (business)computerComunicació i tecnologiaInformation Systemscomputer.programming_language
researchProduct