Search results for "ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS"

showing 10 items of 449 documents

PRIVANET: An Efficient Pseudonym Changing and Management Framework for Vehicular Ad-Hoc Networks

2020

Protecting the location privacy is one of the main challenges in vehicular ad-hoc networks (VANETs). Although, standardization bodies, such as IEEE and ETSI, have adopted a pseudonym-based scheme as a solution for this problem, an efficient pseudonym changing and management is still an open issue. In this paper, we propose PRIVANET, a complete and efficient pseudonym changing and management framework. The PRIVANET has a hierarchical structure and considers the vehicular geographic area as a grid. Each cell of this grid contains one or many logical zones, called vehicular location privacy zones (VLPZs). These zones can easily be deployed over the widespread roadside infrastructures (RIs), su…

Structure (mathematical logic)Scheme (programming language)050210 logistics & transportationStandardizationComputer scienceStochastic modellingbusiness.industryWireless ad hoc networkMechanical Engineeringmedia_common.quotation_subjectComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS05 social sciencesPseudonymGridComputer Science Applications0502 economics and businessAutomotive EngineeringbusinesscomputerComputer networkReputationmedia_commoncomputer.programming_languageIEEE Transactions on Intelligent Transportation Systems
researchProduct

An analytical model of a new packet marking algorithm for TCP flows

2005

In Differentiated Services networks, packets may receive a different treatment according to their Differentiateo Services Code Point (DSCP) label. As a consequence, packet marking schemes can also be devised to differentiate packets belonging to a same TCP flow, with the goal of improving the performance experienced. This paper presents an analytical model for an adaptive packet marking scheme proposed in our previous work. The model combines three specific sub-models aimed at describing (i) the TCP sources aggregate, (ii) the marker, and (iii) the network status. Preliminary simulation results show quite accurate predictions for throughput and average queue occupancy. Besides, the research…

TCP accelerationComputer Networks and CommunicationsComputer scienceTransmission Control ProtocolTCP tuningThroughputRandom early detectionRound-trip delay timeH-TCPActive queue managementTCP sequence prediction attackComputer securitycomputer.software_genrelaw.inventionTCP Westwood plusTCP Friendly Rate ControlPacket switchinglawInternet ProtocolZeta-TCPQueueNetwork packetbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSToken bucketTelecommunications networkTCP global synchronizationDifferentiated servicesNetwork servicebusinesscomputerComputer network
researchProduct

Exploiting programmable architectures for WiFi/ZigBee inter-technology cooperation

2014

The increasing complexity of wireless standards has shown that protocols cannot be designed once for all possible deployments, especially when unpredictable and mutating interference situations are present due to the coexistence of heterogeneous technologies. As such, flexibility and (re)programmability of wireless devices is crucial in the emerging scenarios of technology proliferation and unpredictable interference conditions. In this paper, we focus on the possibility to improve coexistence performance of WiFi and ZigBee networks by exploiting novel programmable architectures of wireless devices able to support run-time modifications of medium access operations. Differently from software…

Technology and EngineeringCognitive networksComputer Networks and CommunicationsComputer scienceDynamic MAC adaptationTime division multiple access02 engineering and technologyMAC protocolMAC protocols0202 electrical engineering electronic engineering information engineeringWirelessCross-technology interferenceINTERFERENCEProtocol prototypingSettore ING-INF/03 - Telecomunicazionibusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsCognitive networkComputer Science ApplicationsEmbedded systemSignal ProcessingInterference avoidanceIBCNWireless network control020201 artificial intelligence & image processingbusinessCognitive networkDecoupling (electronics)Communication channelComputer networkEURASIP Journal on Wireless Communications and Networking
researchProduct

Layout influence on microwave performance of graphene field effect transistors

2018

The authors report on an in-depth statistical and parametrical investigation on the microwave performance of graphene FETs on sapphire substrate. The devices differ for the gate-drain/source distance and for the gate length, having kept instead the gate width constant. Microwave S -parameters have been measured for the different devices. Their results demonstrate that the cut-off frequency does not monotonically increase with the scaling of the device geometry and that it exists an optimal region in the gate-drain/source and gate-length space which maximises the microwave performance.

TechnologyMaterials science02 engineering and technologyHardware_PERFORMANCEANDRELIABILITYSettore ING-INF/01 - Elettronica01 natural scienceslaw.inventionComputer Science::Hardware ArchitectureComputer Science::Emerging Technologieslaw0103 physical sciencesHardware_INTEGRATEDCIRCUITSElectrical and Electronic EngineeringScaling010302 applied physicsbusiness.industryGrapheneComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWide-bandgap semiconductorSettore ING-INF/02 - Campi Elettromagnetici021001 nanoscience & nanotechnologyGraphene field effect transistorsSapphire substrateOptoelectronicsField-effect transistorGraphene0210 nano-technologyConstant (mathematics)businessMicrowaveddc:600MicrowaveHardware_LOGICDESIGN
researchProduct

UAV-Aided Multi-Antenna Covert Communication Against Multiple Wardens

2021

In this paper, we propose a UAV-aided covert communication scheme assisted by a multi-antenna jammer to maximize the transmission rate between a ground transmitter and a UAV receiver against several randomly distributed wardens. The transmitter adopts the maximum ratio transmission, while the jammer zero-forces its transmitted signal at the UAV to disturb the monitoring at wardens without interfering the legitimate transmission. First, we analyze the detection performance and derive the optimal threshold for each warden to minimize its detection outage probability (DOP). Then, with the worst situation in which all wardens set their respective optimal thresholds to achieve the minimum global…

Transmission (telecommunications)Computer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTransmitterMulti antennaReal-time computingCovert communicationComputerApplications_COMPUTERSINOTHERSYSTEMSJammingData_CODINGANDINFORMATIONTHEORYOutage probabilityTransmitter power outputSignalICC 2021 - IEEE International Conference on Communications
researchProduct

Enabling Backoff and Eliminating Redundant Idle Period for Medium Access in LTE-U

2017

To address the burgeoning demand for mobile data, 3GPP is actively studying the capability of operating LTE in the unlicensed band, referred to as LTE-U. One of the main challenges of this approach is to maintain better coexistence between WiFi and LTE-U devices. To enable the coexistence, the listen before talk (LBT) principle has been adopted for LTE-U medium access with two flavors of mechanisms, i.e., load based equipment (LBE) and frame based equipment (FBE) access. In this paper, we consider the FBE mechanism and enhance its performance by introducing a backoff procedure for LTE devices. We investigate the original FBE mechanism defined by 3GPP and the enhanced FBE (E- FBE) mechanism fr…

Transmission delaybusiness.industryComputer scienceMobile broadbandComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS05 social sciences050801 communication & media studiesIdle0508 media and communicationsTransmission (telecommunications)0502 economics and businessListen before talk050211 marketingbusinessComputer network2017 IEEE 86th Vehicular Technology Conference (VTC-Fall)
researchProduct

Preamble Sampling MAC Protocol for Low Power Wireless Sensor Networks with IEEE 802.15.4 Transceivers

2006

In this paper a preamble sampling MAC protocol for low power wireless sensor networks is proposed. The article describes the implementation of the protocol using network nodes equipped with the Chipcon CC2420 802.15.4 transceiver. The power consumption of the transceiver has been measured and the MAC protocol has been adapted to the transceiver properties. The results show the trade-off between power consumption and transmission delay for this algorithm during the communication process.

Transmission delaybusiness.industryComputer sciencecomputer.internet_protocolComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSEnergy consumptionlaw.inventionBluetoothlawLow-power electronicsWireless Application ProtocolComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSTransceiverbusinessWireless sensor networkcomputerIEEE 802.15Computer network2006 IEEE Instrumentation and Measurement Technology Conference Proceedings
researchProduct

Data Mining Approach for Detection of DDoS Attacks Utilizing SSL/TLS Protocol

2015

Denial of Service attacks remain one of the most serious threats to the Internet nowadays. In this study, we propose an algorithm for detection of Denial of Service attacks that utilize SSL/TLS protocol. These protocols encrypt the data of network connections on the application layer which makes it impossible to detect attackers activity based on the analysis of packet payload. For this reason, we concentrate on statistics that can be extracted from packet headers. Based on these statistics, we build a model of normal user behavior by using several data mining algorithms. Once the model has been built, it is used to detect DoS attacks. The proposed framework is tested on the data obtained w…

Transport Layer SecurityNetwork securitybusiness.industryNetwork packetComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSDenial-of-service attackIntrusion detection systemcomputer.software_genreApplication layerAnomaly detectionThe InternetData miningbusinesscomputerComputer network
researchProduct

Collaborative Content Downloading in VANETs with Fuzzy Comprehensive Evaluation

2019

Vehicle collaborative content downloading has become a hotspot in current vehicular ad-hoc network (VANET) research. However, in reality, the highly dynamic nature of VANET makes users lose resources easily, and the transmission of invalid segment data also wastes valuable bandwidth and storage of the users&rsquo

VANETPhysics and Astronomy (miscellaneous)Linear programmingComputer scienceGeneral Mathematics02 engineering and technologyFuzzy logicUploadlangaton tiedonsiirtooptimointi0502 economics and businessfuzzy comprehensive evaluation0202 electrical engineering electronic engineering information engineeringComputer Science (miscellaneous)vehicle collaborative content downloadingta113050210 logistics & transportationVehicular ad hoc networkbusiness.industryQuality of servicelcsh:Mathematics05 social sciencesBandwidth (signal processing)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsSpectral efficiencylcsh:QA1-939Chemistry (miscellaneous)The InternetbusinessComputer networkSymmetry
researchProduct

Secure interworking with P2PSIP and IMS

2010

Paper presented at the 2010 International Symposium on Collaborative Technologies and Systems (CTS). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher: http://dx.doi.org/10.1109/CTS.2010.5478476 In this paper, we propose a secure system model for interconnection between P2PSIP and IMS domains. The interworking solution is based on P2P-IMS GateWay (PIG…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Communication and distributed systems: 423ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS
researchProduct