Search results for "ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS"
showing 10 items of 449 documents
PRIVANET: An Efficient Pseudonym Changing and Management Framework for Vehicular Ad-Hoc Networks
2020
Protecting the location privacy is one of the main challenges in vehicular ad-hoc networks (VANETs). Although, standardization bodies, such as IEEE and ETSI, have adopted a pseudonym-based scheme as a solution for this problem, an efficient pseudonym changing and management is still an open issue. In this paper, we propose PRIVANET, a complete and efficient pseudonym changing and management framework. The PRIVANET has a hierarchical structure and considers the vehicular geographic area as a grid. Each cell of this grid contains one or many logical zones, called vehicular location privacy zones (VLPZs). These zones can easily be deployed over the widespread roadside infrastructures (RIs), su…
An analytical model of a new packet marking algorithm for TCP flows
2005
In Differentiated Services networks, packets may receive a different treatment according to their Differentiateo Services Code Point (DSCP) label. As a consequence, packet marking schemes can also be devised to differentiate packets belonging to a same TCP flow, with the goal of improving the performance experienced. This paper presents an analytical model for an adaptive packet marking scheme proposed in our previous work. The model combines three specific sub-models aimed at describing (i) the TCP sources aggregate, (ii) the marker, and (iii) the network status. Preliminary simulation results show quite accurate predictions for throughput and average queue occupancy. Besides, the research…
Exploiting programmable architectures for WiFi/ZigBee inter-technology cooperation
2014
The increasing complexity of wireless standards has shown that protocols cannot be designed once for all possible deployments, especially when unpredictable and mutating interference situations are present due to the coexistence of heterogeneous technologies. As such, flexibility and (re)programmability of wireless devices is crucial in the emerging scenarios of technology proliferation and unpredictable interference conditions. In this paper, we focus on the possibility to improve coexistence performance of WiFi and ZigBee networks by exploiting novel programmable architectures of wireless devices able to support run-time modifications of medium access operations. Differently from software…
Layout influence on microwave performance of graphene field effect transistors
2018
The authors report on an in-depth statistical and parametrical investigation on the microwave performance of graphene FETs on sapphire substrate. The devices differ for the gate-drain/source distance and for the gate length, having kept instead the gate width constant. Microwave S -parameters have been measured for the different devices. Their results demonstrate that the cut-off frequency does not monotonically increase with the scaling of the device geometry and that it exists an optimal region in the gate-drain/source and gate-length space which maximises the microwave performance.
UAV-Aided Multi-Antenna Covert Communication Against Multiple Wardens
2021
In this paper, we propose a UAV-aided covert communication scheme assisted by a multi-antenna jammer to maximize the transmission rate between a ground transmitter and a UAV receiver against several randomly distributed wardens. The transmitter adopts the maximum ratio transmission, while the jammer zero-forces its transmitted signal at the UAV to disturb the monitoring at wardens without interfering the legitimate transmission. First, we analyze the detection performance and derive the optimal threshold for each warden to minimize its detection outage probability (DOP). Then, with the worst situation in which all wardens set their respective optimal thresholds to achieve the minimum global…
Enabling Backoff and Eliminating Redundant Idle Period for Medium Access in LTE-U
2017
To address the burgeoning demand for mobile data, 3GPP is actively studying the capability of operating LTE in the unlicensed band, referred to as LTE-U. One of the main challenges of this approach is to maintain better coexistence between WiFi and LTE-U devices. To enable the coexistence, the listen before talk (LBT) principle has been adopted for LTE-U medium access with two flavors of mechanisms, i.e., load based equipment (LBE) and frame based equipment (FBE) access. In this paper, we consider the FBE mechanism and enhance its performance by introducing a backoff procedure for LTE devices. We investigate the original FBE mechanism defined by 3GPP and the enhanced FBE (E- FBE) mechanism fr…
Preamble Sampling MAC Protocol for Low Power Wireless Sensor Networks with IEEE 802.15.4 Transceivers
2006
In this paper a preamble sampling MAC protocol for low power wireless sensor networks is proposed. The article describes the implementation of the protocol using network nodes equipped with the Chipcon CC2420 802.15.4 transceiver. The power consumption of the transceiver has been measured and the MAC protocol has been adapted to the transceiver properties. The results show the trade-off between power consumption and transmission delay for this algorithm during the communication process.
Data Mining Approach for Detection of DDoS Attacks Utilizing SSL/TLS Protocol
2015
Denial of Service attacks remain one of the most serious threats to the Internet nowadays. In this study, we propose an algorithm for detection of Denial of Service attacks that utilize SSL/TLS protocol. These protocols encrypt the data of network connections on the application layer which makes it impossible to detect attackers activity based on the analysis of packet payload. For this reason, we concentrate on statistics that can be extracted from packet headers. Based on these statistics, we build a model of normal user behavior by using several data mining algorithms. Once the model has been built, it is used to detect DoS attacks. The proposed framework is tested on the data obtained w…
Collaborative Content Downloading in VANETs with Fuzzy Comprehensive Evaluation
2019
Vehicle collaborative content downloading has become a hotspot in current vehicular ad-hoc network (VANET) research. However, in reality, the highly dynamic nature of VANET makes users lose resources easily, and the transmission of invalid segment data also wastes valuable bandwidth and storage of the users&rsquo
Secure interworking with P2PSIP and IMS
2010
Paper presented at the 2010 International Symposium on Collaborative Technologies and Systems (CTS). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher: http://dx.doi.org/10.1109/CTS.2010.5478476 In this paper, we propose a secure system model for interconnection between P2PSIP and IMS domains. The interworking solution is based on P2P-IMS GateWay (PIG…