906 research outputs found

    Master of Science

    Get PDF
    thesisEmergency "911" service is a critical function provided in the Public Switched Telephone Network (PSTN), cellular and Voice over Internet Protocol (VoIP) networks. Wi-Fi, despite its growing importance, has no such service. In this thesis, we develop a 911-like service for Wi-Fi-capable devices, enabling them to send emergency messages through any available hotspot or access point. Our service makes use of existing 802.11 management frames and does not require the client device to associate or authenticate with the access point; this makes it available even on protected networks to which the client would not normally have access, even encrypted ones. This design ensures maximum potential reach and usability, and helps to increase public safety

    Performance evaluation of wake-up radio based wireless body area network

    Get PDF
    Abstract. The last decade has been really ambitious in new research and development techniques to reduce energy consumption especially in wireless sensor networks (WSNs). Sensor nodes are usually battery-powered and thus have very limited lifetime. Energy efficiency has been the most important aspect to discuss when talking about wireless body area network (WBAN) in particular, since it is the bottleneck of these networks. Medium access control (MAC) protocols hold the vital position to determine the energy efficiency of a WBAN, which is a key design issue for battery operated sensor nodes. The wake-up radio (WUR) based MAC and physical layer (PHY) have been evaluated in this research work in order to contribute to the energy efficient solutions development. WUR is an on-demand approach in which the node is woken up by the wake-up signal (WUS). A WUS switches a node from sleep mode to wake up mode to start signal transmission and reception. The WUS is transmitted or received by a secondary radio transceiver, which operates on very low power. The energy benefit of using WUR is compared with conventional duty-cycling approach. As the protocol defines the nodes in WUR based network do not waste energy on idle listening and are only awakened when there is a request for communication, therefore, energy consumption is extremely low. The performance of WUR based MAC protocol has been evaluated for both physical layer (PHY) and MAC for transmission of WUS and data. The probabilities of miss detection, false alarm and detection error rates are calculated for PHY and the probabilities of collision and successful data transmission for channel access method Aloha is evaluated. The results are obtained to compute and compare the total energy consumption of WUR based network with duty cycling. The results prove that the WUR based networks have significant potential to improve energy efficiency, in comparison to conventional duty cycling approach especially, in the case of low data-reporting rate applications. The duty cycle approach is better than WUR approach when sufficiently low duty cycle is combined with highly frequent communication between the network nodes

    Reliable Radio Access for Massive Machine-to-Machine (M2M) Communication

    Get PDF

    Wireless Networking for Vehicle to Infrastructure Communication and Automatic Incident Detection

    Get PDF
    Vehicular wireless communication has recently generated wide interest in the area of wireless network research. Automatic Incident Detection (AID), which is the recent focus of research direction in Intelligent Transportation System (ITS), aims to increase road safety. These advances in technology enable traffic systems to use data collected from vehicles on the road to detect incidents. We develop an automatic incident detection method that has a significant active road safety application for alerting drivers about incidents and congestion. Our method for detecting traffic incidents in a highway scenario is based on the use of distance and time for changing lanes along with the vehicle speed change over time. Numerical results obtained from simulating our automatic incident detection technique suggest that our incident detection rate is higher than that of other techniques such as integrated technique. probabilistic technique and California Algorithm. We also propose a technique to maximize the number of vehicles aware of Road Side Units (RSUs) in order to enhance the accuracy of our AID technique. In our proposed Method. IEEE 802.11 standard is used at RSUs with multiple antennas to assign each lane a specific channel. To validate our proposed approach. we present both analytical and simulation scenarios. The empirical values which are obtained from both analytical and simulation results have been compared to show their consistency. Results indicate that the IEEE 802.11 standard with its beaconing mechanism can be successfully used for Vehicle to Infrastructure (V2I) communications

    5GAuRA. D3.3: RAN Analytics Mechanisms and Performance Benchmarking of Video, Time Critical, and Social Applications

    Get PDF
    5GAuRA deliverable D3.3.This is the final deliverable of Work Package 3 (WP3) of the 5GAuRA project, providing a report on the project’s developments on the topics of Radio Access Network (RAN) analytics and application performance benchmarking. The focus of this deliverable is to extend and deepen the methods and results provided in the 5GAuRA deliverable D3.2 in the context of specific use scenarios of video, time critical, and social applications. In this respect, four major topics of WP3 of 5GAuRA – namely edge-cloud enhanced RAN architecture, machine learning assisted Random Access Channel (RACH) approach, Multi-access Edge Computing (MEC) content caching, and active queue management – are put forward. Specifically, this document provides a detailed discussion on the service level agreement between tenant and service provider in the context of network slicing in Fifth Generation (5G) communication networks. Network slicing is considered as a key enabler to 5G communication system. Legacy telecommunication networks have been providing various services to all kinds of customers through a single network infrastructure. In contrast, by deploying network slicing, operators are now able to partition one network into individual slices, each with its own configuration and Quality of Service (QoS) requirements. There are many applications across industry that open new business opportunities with new business models. Every application instance requires an independent slice with its own network functions and features, whereby every single slice needs an individual Service Level Agreement (SLA). In D3.3, we propose a comprehensive end-to-end structure of SLA between the tenant and the service provider of sliced 5G network, which balances the interests of both sides. The proposed SLA defines reliability, availability, and performance of delivered telecommunication services in order to ensure that right information is delivered to the right destination at right time, safely and securely. We also discuss the metrics of slicebased network SLA such as throughput, penalty, cost, revenue, profit, and QoS related metrics, which are, in the view of 5GAuRA, critical features of the agreement.Peer ReviewedPostprint (published version

    Contention Based SCMA for NB-IoT Uplink Communication using Finite Memory Sequential Learning

    Get PDF

    When the Industry Goes Wireless: Drivers, Requirements, Technology and Future Trends

    Get PDF
    Non

    Security protocols suite for machine-to-machine systems

    Get PDF
    Nowadays, the great diffusion of advanced devices, such as smart-phones, has shown that there is a growing trend to rely on new technologies to generate and/or support progress; the society is clearly ready to trust on next-generation communication systems to face today’s concerns on economic and social fields. The reason for this sociological change is represented by the fact that the technologies have been open to all users, even if the latter do not necessarily have a specific knowledge in this field, and therefore the introduction of new user-friendly applications has now appeared as a business opportunity and a key factor to increase the general cohesion among all citizens. Within the actors of this technological evolution, wireless machine-to-machine (M2M) networks are becoming of great importance. These wireless networks are made up of interconnected low-power devices that are able to provide a great variety of services with little or even no user intervention. Examples of these services can be fleet management, fire detection, utilities consumption (water and energy distribution, etc.) or patients monitoring. However, since any arising technology goes together with its security threats, which have to be faced, further studies are necessary to secure wireless M2M technology. In this context, main threats are those related to attacks to the services availability and to the privacy of both the subscribers’ and the services providers’ data. Taking into account the often limited resources of the M2M devices at the hardware level, ensuring the availability and privacy requirements in the range of M2M applications while minimizing the waste of valuable resources is even more challenging. Based on the above facts, this Ph. D. thesis is aimed at providing efficient security solutions for wireless M2M networks that effectively reduce energy consumption of the network while not affecting the overall security services of the system. With this goal, we first propose a coherent taxonomy of M2M network that allows us to identify which security topics deserve special attention and which entities or specific services are particularly threatened. Second, we define an efficient, secure-data aggregation scheme that is able to increase the network lifetime by optimizing the energy consumption of the devices. Third, we propose a novel physical authenticator or frame checker that minimizes the communication costs in wireless channels and that successfully faces exhaustion attacks. Fourth, we study specific aspects of typical key management schemes to provide a novel protocol which ensures the distribution of secret keys for all the cryptographic methods used in this system. Fifth, we describe the collaboration with the WAVE2M community in order to define a proper frame format actually able to support the necessary security services, including the ones that we have already proposed; WAVE2M was funded to promote the global use of an emerging wireless communication technology for ultra-low and long-range services. And finally sixth, we provide with an accurate analysis of privacy solutions that actually fit M2M-networks services’ requirements. All the analyses along this thesis are corroborated by simulations that confirm significant improvements in terms of efficiency while supporting the necessary security requirements for M2M networks
    • …
    corecore