8 research outputs found

    Novel Random Access Schemes for Small Data Transmission

    Get PDF

    Deploying an NFV-Based Experimentation Scenario for 5G Solutions in Underserved Areas

    Get PDF
    Presently, a significant part of the world population does not have Internet access. The fifth-generation cellular network technology evolution (5G) is focused on reducing latency, increasing the available bandwidth, and enhancing network performance. However, researchers and companies have not invested enough effort into the deployment of the Internet in remote/rural/undeveloped areas for different techno-economic reasons. This article presents the result of a collaboration between Brazil and the European Union, introducing the steps designed to create a fully operational experimentation scenario with the main purpose of integrating the different achievements of the H2020 5G-RANGE project so that they can be trialed together into a 5G networking use case. The scenario encompasses (i) a novel radio access network that targets a bandwidth of 100 Mb/s in a cell radius of 50 km, and (ii) a network of Small Unmanned Aerial Vehicles (SUAV). This set of SUAVs is NFV-enabled, on top of which Virtual Network Functions (VNF) can be automatically deployed to support occasional network communications beyond the boundaries of the 5G-RANGE radio cells. The whole deployment implies the use of a virtual private overlay network enabling the preliminary validation of the scenario components from their respective remote locations, and simplifying their subsequent integration into a single local demonstrator, the configuration of the required GRE/IPSec tunnels, the integration of the new 5G-RANGE physical, MAC and network layer components and the overall validation with voice and data services

    5G URLLC๋ฅผ ์œ„ํ•œ ์ €์ง€์—ฐ ํ†ต์‹  ํ”„๋กœํ† ์ฝœ

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ(๋ฐ•์‚ฌ)--์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› :๊ณต๊ณผ๋Œ€ํ•™ ์ „๊ธฐยท์ปดํ“จํ„ฐ๊ณตํ•™๋ถ€,2020. 2. ์‹ฌ๋ณ‘ํšจ.2020๋…„ IMT ๋น„์ „์— ๋”ฐ๋ฅด๋ฉด 5 ์„ธ๋Œ€ (5G) ์ด๋™ ํ†ต์‹  ์„œ๋น„์Šค๋Š” eMBB (Enhanced Mobile Broadband), mMTC (Massive Machine Type Communication) ๋ฐ URLLC (Ultra Reliability and Low Latency Communication)์˜ ์„ธ ๊ฐ€์ง€ ์„œ๋น„์Šค๋กœ ๋ถ„๋ฅ˜๋œ๋‹ค. ๋‚ฎ์€ ์ง€์—ฐ ์‹œ๊ฐ„๊ณผ ๋†’์€ ์‹ ๋ขฐ๋„๋ฅผ ๋™์‹œ์— ๋ณด์žฅํ•˜๋Š” ๊ฒƒ์€ ์‹ค์‹œ๊ฐ„ ์„œ๋น„์Šค ๋ฐ ์‘์šฉ ํ”„๋กœ๊ทธ๋žจ์˜ ์ƒ์šฉํ™”๋ฅผ ์œ„ํ•˜์—ฌ ํ•„์š”ํ•œ ํ•ต์‹ฌ ๊ธฐ์ˆ ์ด๊ณ , 3 ๊ฐœ์˜ 5G ์„œ๋น„์Šค ์ค‘ URLLC๋Š” ๊ฐ€์žฅ ์–ด๋ ค์šด ์‹œ๋‚˜๋ฆฌ์˜ค๋กœ ์—ฌ๊ฒจ์ง€๊ณ  ์žˆ๋‹ค. ๋ณธ ํ•™์œ„ ๋…ผ๋ฌธ์—์„œ๋Š” URLLC ์„œ๋น„์Šค๋ฅผ ์ง€์›ํ•˜๊ธฐ ์œ„ํ•ด ๋‹ค์Œ๊ณผ ๊ฐ™์€ 3๊ฐ€์ง€ ์ €์ง€์—ฐ ํ†ต์‹  ํ”„๋กœํ† ์ฝœ์„ ์ œ์•ˆํ•œ๋‹ค: (i) 2-way ํ•ธ๋“œ์‰์ดํฌ ๊ธฐ๋ฐ˜ ๋žœ๋ค ์•ก์„ธ์Šค, (ii) Fast Grant Multiple Access ๋ฐ (iii) UE๊ฐ€ ์‹œ์ž‘ํ•˜๋Š” ํ•ธ๋“œ ์˜ค๋ฒ„ ๋ฐฉ์‹. ์ฒซ์งธ, 5G์—์„œ ๋ชฉํ‘œ๋กœ ํ•˜๋Š” ์„ฑ๋Šฅ ์ง€ํ‘œ๋Š” ๋ฐ์ดํ„ฐ ์ „์†ก๋ฅ ์˜ ์ฆ๊ฐ€๋ฟ๋งŒ ์•„๋‹ˆ๋ผ ์ง€์—ฐ ์‹œ๊ฐ„์„ ๊ฐ์†Œ์‹œํ‚ค๋Š” ๊ฒƒ๋„ ํฌํ•จํ•˜๊ณ  ์žˆ๋‹ค. ํ˜„์žฌ LTE-Advanced ์‹œ์Šคํ…œ์€ ๋žœ๋ค ์•ก์„ธ์Šค ๋ฐ ์ƒํ–ฅ ๋งํฌ ์ „์†ก ์ ˆ์ฐจ์—์„œ 4๊ฐœ์˜ ๋ฉ”์‹œ์ง€ ๊ตํ™˜์„ ํ•„์š”๋กœํ•˜๊ณ , ์ด๋Š” ๋†’์€ ์ง€์—ฐ ์‹œ๊ฐ„์„ ์•ผ๊ธฐํ•œ๋‹ค. ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ์ด๋Ÿฌํ•œ ์ง€์—ฐ ์‹œ๊ฐ„์„ ํšจ๊ณผ์ ์œผ๋กœ ์ค„์ด๊ธฐ ์œ„ํ•˜์—ฌ 2-way ๋žœ๋ค ์•ก์„ธ์Šค ๋ฐฉ์‹์„ ์ œ์•ˆํ•œ๋‹ค. ์ œ์•ˆํ•œ 2-way ๋žœ๋ค ์•ก์„ธ์Šค ๊ธฐ์ˆ ์€ ํ”„๋ฆฌ์•ฐ๋ธ”์˜ ์ˆ˜๋ฅผ ์ฆ๊ฐ€์‹œํ‚ด์œผ๋กœ์จ ํ•ด๋‹น ์ ˆ์ฐจ๋ฅผ ์™„๋ฃŒํ•˜๋Š”๋ฐ ๋‹จ 2๊ฐœ์˜ ๋ฉ”์‹œ์ง€ ๋งŒ ํ•„์š”ํ•˜๋‹ค. ์šฐ๋ฆฌ๋Š” ์ด๋Ÿฌํ•œ ํ”„๋ฆฌ์•ฐ๋ธ”์„ ์ƒ์„ฑํ•˜๊ณ  ํ™œ์šฉํ•˜๋Š” ๋ฐฉ๋ฒ•์„ ์—ฐ๊ตฌํ–ˆ๊ณ , ๋‹ค์–‘ํ•œ ์‹œ๋ฎฌ๋ ˆ์ด์…˜์„ ํ†ตํ•˜์—ฌ ์ œ์•ˆํ•œ ๋žœ๋ค ์•ก์„ธ์Šค ๋ฐฉ์‹์ด ๊ธฐ์กด ๊ธฐ์ˆ ๊ณผ ๋น„๊ตํ•˜์—ฌ ์ง€์—ฐ ์‹œ๊ฐ„์„ ์ตœ๋Œ€ 43% ์ค„์ด๋Š” ๊ฒƒ ์„ ํ™•์ธํ–ˆ๋‹ค. ๋˜ํ•œ ์ œ์•ˆํ•œ ๋žœ๋ค ์•ก์„ธ์Šค๋Š” ๊ณ„์‚ฐ ๋ณต์žก๋„๊ฐ€ ์•ฝ๊ฐ„ ์ฆ๊ฐ€ํ•˜์ง€๋งŒ, ๋„คํŠธ์›Œํฌ ๋กœ๋“œ๋Š” ๊ธฐ์กด ๊ธฐ์ˆ ์— ๋น„ํ•ด ์ ˆ๋ฐ˜ ์ด์ƒ ๊ฐ์†Œํ•œ๋‹ค. ๋‘˜์งธ,์›๊ฒฉ ๋™์ž‘,์ž์œจ ์ฃผํ–‰,๋ชฐ์ž…ํ˜• ๊ฐ€์ƒ ํ˜„์‹ค ๋“ฑ๊ณผ ๊ฐ™์€ ๋‹ค์–‘ํ•œ ๋ฏธ์…˜ ํฌ๋ฆฌํ‹ฐ์ปฌ ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜์ด ๋“ฑ์žฅํ•˜๊ณ  ์žˆ๋‹ค. ๋‹ค์–‘ํ•œ URLLC ํŠธ๋ž˜ํ”ฝ์€ ๋‹ค์–‘ํ•œ ์ง€์—ฐ ์‹œ๊ฐ„ ๋ฐ ์‹ ๋ขฐ๋„ ์ˆ˜์ค€์„ ์š”๊ตฌ ์‚ฌํ•ญ์œผ๋กœ ๊ฐ€์ง€๊ณ  ์žˆ๊ณ , ์ด์™€ ํ•จ๊ป˜ ํ•„์š”ํ•œ ๋ฐ์ดํ„ฐ ํฌ๊ธฐ ๋ฐ ํŒจํ‚ท์˜ ๋ฐœ์ƒ์œจ ๋“ฑ์˜ ์ธก๋ฉด์—์„œ ๋‹ค์–‘ํ•œ ํŠน์„ฑ์„ ๊ฐ€์ง€๊ณ  ์žˆ๋‹ค. ๋ฏธ์…˜ ํฌ๋ฆฌํ‹ฐ์ปฌ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์˜ ๋‹ค์–‘ํ•œ ์š”๊ตฌ ์‚ฌํ•ญ์„ ์ง€์›ํ•˜๊ธฐ ์œ„ํ•ด ์ƒํ–ฅ ๋งํฌ ์ „์†ก์— ์ค‘์ ์„ ๋‘” FGMA(Fast Grant Multiple Access)๋ฅผ ์ œ์•ˆํ–ˆ๋‹ค. FGMA๋Š” ์Šน์ธ ์ œ์–ด ์•Œ๊ณ ๋ฆฌ์ฆ˜, ๋™์  ํ”„๋ฆฌ์•ฐ๋ธ” ๊ตฌ์กฐ, ์ƒํ–ฅ ๋งํฌ ์Šค์ผ€์ค„๋ง ๋ฐ ์ ์‘์  ๋Œ€์—ญํญ ์กฐ์ ˆ์˜ ๋„ค ๊ฐ€์ง€ ๋ถ€๋ถ„์œผ๋กœ ๊ตฌ์„ฑ๋œ๋‹ค. FGMA์—์„œ๋Š” ์ง€์—ฐ ์‹œ๊ฐ„์„ ์ตœ์†Œํ™” ํ•˜๋Š” ๋ฐฉํ–ฅ์œผ๋กœ ์ž์› ํ• ๋‹น์„ ํ•œ๋‹ค. ์ด ๋ฐฉ๋ฒ•์„ ํ™œ์šฉํ•˜๋ฉด ์ ์‘์  ๋Œ€์—ญํญ ์กฐ์ ˆ ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ํ†ตํ•ด ์ง€์—ฐ ์‹œ๊ฐ„ ์š”๊ตฌ ์‚ฌํ•ญ์ด ๋‹ค๋ฅธ ํŠธ๋ž˜ํ”ฝ์˜ ๋ถˆ๊ท ํ˜•์„ ์™„ํ™” ์‹œํ‚ฌ ์ˆ˜ ์žˆ๋‹ค. ๋˜ํ•œ ์Šน์ธ ์ œ์–ด ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ํ†ตํ•ด FGMA ์‹œ์Šคํ…œ์— ์ด๋ฏธ ์Šน์ธ๋œ ๋ชจ๋“  UE๋“ค์— ๋Œ€ํ•œ ์š”๊ตฌ ์‚ฌํ•ญ์„ ํ•ญ์ƒ ๋ณด์žฅํ•œ๋‹ค. FGMA๋Š” ์‹œ๊ฐ„์— ๋”ฐ๋ผ ๋ณ€ํ•˜๋Š” ํ™˜๊ฒฝ์—์„œ๋„ UE์˜ QoS ์š”๊ตฌ ์‚ฌํ•ญ์„ ํšจ์œจ์ ์œผ๋กœ ๋ณด์žฅํ•œ๋‹ค๋Š” ๊ฒƒ์„ ํ™•์ธ ํ•  ์ˆ˜ ์žˆ๋‹ค. ๋งˆ์ง€๋ง‰์œผ๋กœ, ์†Œํ˜• ์…€์€ ์…€๋ฃฐ๋Ÿฌ ์„œ๋น„์Šค ๋ฒ”์œ„๋ฅผ ๊ฐœ์„ ํ•˜๊ณ  ์‹œ์Šคํ…œ ์šฉ๋Ÿ‰์„ ํ–ฅ์ƒ ์‹œ ํ‚ค๊ณ , ๋งŽ์€ ์ˆ˜์˜ ๋ฌด์„  ๋‹จ๋ง์„ ์ง€์›ํ•˜๋Š” ํ•ต์‹ฌ ๊ธฐ์ˆ ๋กœ ๋– ์˜ค๋ฅด๊ณ  ์žˆ๋‹ค. ํ•˜์ง€๋งŒ ์…€์˜ ์„œ๋น„์Šค ๋ฒ”์œ„์˜ ๊ฐ์†Œ๋Š” ๋นˆ๋ฒˆํ•œ ํ•ธ๋“œ์˜ค๋ฒ„๋ฅผ ์œ ๋„ํ•˜๊ธฐ ๋•Œ๋ฌธ์—, ํšจ๊ณผ์ ์ธ ํ•ธ๋“œ์˜ค๋ฒ„ ๋ฐฉ์‹์ดURLLC ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์„ ์ง€์›ํ•˜๊ธฐ ์œ„ํ•ด์„œ ํ•„์š”ํ•˜๋‹ค. ๋”ฐ๋ผ์„œ, URLLC์„œ๋น„์Šค๋ฅผ ์š”๊ตฌํ•˜๋Š” ์ด๋™์„ฑ์ด ์žˆ๋Š” UE๋ฅผ ์„œ๋น„์Šคํ•˜๊ธฐ ์œ„ํ•ด ์ ์‘์  ํ•ธ๋“œ์˜ค๋ฒ„ ํŒŒ๋ผ๋ฏธํ„ฐ๋ฅผ ์„ ํƒ ๋ฐ ๋‹จ๋ง์˜ ๋™์ž‘์„ ๋ฏธ๋ฆฌ ์ค€๋น„ํ•ด ๋†“๋Š” ๋ฐฉ์‹์„ ์ ์šฉํ•œ ๋‹จ๋ง์ด ์‹œ์ž‘ํ•˜๋Š” ํ•ธ๋“œ์˜ค๋ฒ„ ๋ฐฉ์‹์„ ์ œ์•ˆํ•œ๋‹ค. ์‹œ๋ฎฌ๋ ˆ์ด์…˜ ๊ฒฐ๊ณผ๋Š” ์ œ์•ˆํ•œ ํ•ธ๋“œ์˜ค๋ฒ„๊ฐ€ ์ˆ˜์œจ์„ ํ–ฅ์ƒ์‹œํ‚ด๊ณผ ๋™์‹œ์— ์ €์ง€์—ฐ์„ ๋‹ฌ์„ฑํ•˜๋Š” ๊ฒƒ์„ ํ™•์ธ ํ•  ์ˆ˜ ์žˆ๋‹ค. ๋ณธ ๋…ผ๋ชฌ์„ ๊ฐ„๋žตํžˆ ์š”์•ฝํ•˜๋ฉด ์ง€์—ฐ ์‹œ๊ฐ„์˜ ์ข…๋ฅ˜๋ฅผ ๋žœ๋ค ์•ก์„ธ์Šค ์ง€์—ฐ ์‹œ๊ฐ„, ์ƒํ–ฅ ๋งํฌ ๋ฐ์ดํ„ฐ ์ „์†ก ์ง€์—ฐ ์‹œ๊ฐ„ ๋ฐ ํ•ธ๋“œ์˜ค๋ฒ„ ์ง€์—ฐ ์‹œ๊ฐ„๊ณผ ๊ฐ™์ด 3๊ฐ€์ง€๋กœ ๊ตฌ๋ถ„ํ•˜์˜€๋‹ค. 3๊ฐ€์ง€ ์ข…๋ฅ˜์˜ ์ง€์—ฐ ์‹œ๊ฐ„์— ๋Œ€ํ•ด์„œ ๊ฐ๊ฐ ์ €์ง€์—ฐ์„ ๋‹ฌ์„ฑ ํ•  ์ˆ˜ ์žˆ๋Š” ํ”„๋กœํ† ์ฝœ๊ณผ ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ์ œ์•ˆํ•˜์˜€๋‹ค.According to IMT vision for 2020, the fifth generation (5G) wireless services are classified into three categories, namely, Enhanced Mobile Broadband (eMBB), Massive Machine Type Communication (mMTC), and Ultra Reliable and Low Latency Communication (URLLC). Among three 5G service categories, URLLC is considered as the most challenging scenario. Thus, ensuring the latency and reliability is a key to the success of real-time services and applications. In this dissertation, we propose the following three latency reduction protocols to support the URLLC services: (i)2-way handshake-based random access, (ii) Fast grant multiple access, and (iii) UE-initiated handover scheme. First, the performance target includes not only increasing data rate, but also reducing latency in 5G cellular networks. The current LTE-Advanced systems require four message exchanges in the random access and uplink transmission procedure, thus inducing high latency. We propose a 2-way random access scheme which effectively reduces the latency. The proposed 2-way random access requires only two messages to complete the procedure at the cost of increased number of preambles. We study how to generate such preambles and how to utilize them. According to extensive simulation results, the proposed random access scheme significantly outperforms conventional schemes by reducing latency by up to 43%. We also demonstrate that computational complexity slightly increases in the proposed scheme, while network load is reduced more than a half compared to the conventional schemes. Second, various mission-critical applications are emerging such as teleoperation, autonomous driving, immersive virtual reality, and so on. A variety of URLLC traffic has various characteristics in terms of required data sizes and arrival rates with a variety of requirements of latency and reliability. To support the various requirements of the mission-critical applications, We propose a fast grant multiple access (FGMA) focusing on the uplink transmission. FGMA consists of four important parts, namely, admission control, dynamic preamble structure, the uplink scheduling, and bandwidth adaptation. The latency minimization scheduling policy is adopted in FGMA. Taking advantage of this method, the bandwidth adaptation algorithm makes even for the imbalanced arrival of the traffic requiring different latency requirements. With the proposed admission control, FGMA guarantee the requirements to all admitted UEs in the systems. We observe that the proposed FGMA efficiently guarantee the QoS requirements of the UEs even with the dynamic time-varying environment. Finally, small cells are considered a promising solution for improving cellular coverage, enhancing system capacity and supporting the massive number of things. Reduction of the cell coverage induced the frequent handover, so that the effective handover scheme is of importance in the presence of the URLLC applications. Thus, we propose a UE-initiated handover to deal with the mobile UEs requiring URLLC services taking into account the adaptive handover parameter selection and the logic of preparing in advance. The simulation results show that the proposed handover enhances the throughput performance as well as achieving low latency. In summary, we identify interesting problem in terms of latency. We classify three latency, random access latency, data transmission latency, and handover latency. With compelling protocols and algorithms, we resolve the above three problems.1 Introduction 1 1.1 Motivation 1 1.2 Main Contributions 2 1.2.1 Low Latency Random Access for Small Cell Toward Future Cellular Networks 2 1.2.2 Fast Grant Multiple Access in Large-Scale Antenna Systems for URLLC Services 3 1.2.3 UE-initiated Handover for Low Latency Communications 4 1.3 Organization of the Dissertation 4 2 Low Latency Random Access for Small Cell Toward Future Cellular Networks 6 2.1 Introduction 6 2.2 Related Work 9 2.3 Random Access and Uplink Transmission Procedure in LTE-A 11 2.3.1 Random Access in LTE-A 12 2.3.2 Uplink Transmission Procedure 14 2.3.3 Latency Issue in LTE-A 15 2.4 Proposed Random Access 16 2.4.1 Key Idea . 17 2.4.2 Proposed Preamble and Categorization 18 2.5 Preamble Sequence Analysis 23 2.5.1 Preamble Sequence Generation in LTE-A 23 2.5.2 Proposed Preamble Sequence Generation 25 2.5.3 Proposed Preamble Detection 26 2.6 Performance Evaluation 31 2.6.1 Network Latency 32 2.6.2 One-way Latency 33 2.6.3 Network Load 36 2.6.4 Computational Complexity 37 2.7 Conclusion 39 3 Fast Grant Multiple Access in Large-Scale Antenna Systems for URLLC Services 40 3.1 Introduction 40 3.2 Related Work 43 3.3 System Model 44 3.3.1 QoS Information and Service Category 45 3.3.2 Channel Structure 47 3.3.3 Frame Structure 48 3.4 Fast Grant Multiple Access 49 3.4.1 The Uplink Scheduling Policy 51 3.4.2 Dynamic Preamble Structure 53 3.4.3 Admission Control 54 3.4.4 Bandwidth Adaptation 55 3.5 Performance Evaluation 57 3.5.1 Impact of admission control 59 3.5.2 Impact of bandwidth adaptation 61 3.5.3 FGMA performance 62 3.6 Conclusion 64 4 UE-initiated Handover for Low Latency Communications 67 4.1 Introduction 67 4.2 Background and Motivation 69 4.2.1 Handover Decision Principle 69 4.2.2 Handover Procedure 70 4.2.3 Summary of the latency issues 72 4.3 UE-initiated Handover 73 4.3.1 The proposed handover design principles 73 4.3.2 The proposed handover procedure 75 4.4 Performance Evaluation 77 4.4.1 Low mobility environment 77 4.4.2 Low mobility environment 78 4.4.3 High mobility environment 80 4.5 Conclusion 82 5 ConcludingRemarks 84 5.1 Research Contributions 84 Abstract (InKorean) 92Docto

    URLLC for 5G and Beyond: Requirements, Enabling Incumbent Technologies and Network Intelligence

    Get PDF
    The tactile internet (TI) is believed to be the prospective advancement of the internet of things (IoT), comprising human-to-machine and machine-to-machine communication. TI focuses on enabling real-time interactive techniques with a portfolio of engineering, social, and commercial use cases. For this purpose, the prospective 5{th} generation (5G) technology focuses on achieving ultra-reliable low latency communication (URLLC) services. TI applications require an extraordinary degree of reliability and latency. The 3{rd} generation partnership project (3GPP) defines that URLLC is expected to provide 99.99% reliability of a single transmission of 32 bytes packet with a latency of less than one millisecond. 3GPP proposes to include an adjustable orthogonal frequency division multiplexing (OFDM) technique, called 5G new radio (5G NR), as a new radio access technology (RAT). Whereas, with the emergence of a novel physical layer RAT, the need for the design for prospective next-generation technologies arises, especially with the focus of network intelligence. In such situations, machine learning (ML) techniques are expected to be essential to assist in designing intelligent network resource allocation protocols for 5G NR URLLC requirements. Therefore, in this survey, we present a possibility to use the federated reinforcement learning (FRL) technique, which is one of the ML techniques, for 5G NR URLLC requirements and summarizes the corresponding achievements for URLLC. We provide a comprehensive discussion of MAC layer channel access mechanisms that enable URLLC in 5G NR for TI. Besides, we identify seven very critical future use cases of FRL as potential enablers for URLLC in 5G NR

    A Distributed Audit Trail for the Internet of Things

    Get PDF
    Sharing Internet of Things (IoT) data over open-data platforms and digital data marketplaces can reduce infrastructure investments, improve sustainability by reducing the required resources, and foster innovation. However, due to the inability to audit the authenticity, integrity, and quality of IoT data, third-party data consumers cannot assess the trustworthiness of received data. Therefore, it is challenging to use IoT data obtained from third parties for quality-relevant applications. To overcome this limitation, the IoT data must be auditable. Distributed Ledger Technology (DLT) is a promising approach for building auditable systems. However, the existing solutions do not integrate authenticity, integrity, data quality, and location into an all-encompassing auditable model and only focus on specific parts of auditability. This thesis aims to provide a distributed audit trail that makes the IoT auditable and enables sharing of IoT data between multiple organizations for quality relevant applications. Therefore, we designed and evaluated the Veritaa framework. The Veritaa framework comprises the Graph of Trust (GoT) as distributed audit trail and a DLT to immutably store the transactions that build the GoT. The contributions of this thesis are summarized as follows. First, we designed and evaluated the GoT a DLT-based Distributed Public Key Infrastructure (DPKI) with a signature store. Second, we designed a Distributed Calibration Certificate Infrastructure (DCCI) based on the GoT, which makes quality-relevant maintenance information of IoT devices auditable. Third, we designed an Auditable Positioning System (APS) to make positions in the IoT auditable. Finally, we designed an Location Verification System (LVS) to verify location claims and prevent physical layer attacks against the APS. All these components are integrated into the GoT and build the distributed audit trail. We implemented a real-world testbed to evaluate the proposed distributed audit trail. This testbed comprises several custom-built IoT devices connectable over Long Range Wide Area Network (LoRaWAN) or Long-Term Evolution Category M1 (LTE Cat M1), and a Bluetooth Low Energy (BLE)-based Angle of Arrival (AoA) positioning system. All these low-power devices can manage their identity and secure their data on the distributed audit trail using the IoT client of the Veritaa framework. The experiments suggest that a distributed audit trail is feasible and secure, and the low-power IoT devices are capable of performing the required cryptographic functions. Furthermore, the energy overhead introduced by making the IoT auditable is limited and reasonable for quality-relevant applications

    Protocol Design and Performance Evaluation of Wake-up Radio enabled IoT Networks

    Get PDF
    publishedVersio

    3GPP Release 15 Early Data Transmission

    No full text
    corecore