47,085 research outputs found
A Survey on 5G: The Next Generation of Mobile Communication
The rapidly increasing number of mobile devices, voluminous data, and higher
data rate are pushing to rethink the current generation of the cellular mobile
communication. The next or fifth generation (5G) cellular networks are expected
to meet high-end requirements. The 5G networks are broadly characterized by
three unique features: ubiquitous connectivity, extremely low latency, and very
high-speed data transfer. The 5G networks would provide novel architectures and
technologies beyond state-of-the-art architectures and technologies. In this
paper, our intent is to find an answer to the question: "what will be done by
5G and how?" We investigate and discuss serious limitations of the fourth
generation (4G) cellular networks and corresponding new features of 5G
networks. We identify challenges in 5G networks, new technologies for 5G
networks, and present a comparative study of the proposed architectures that
can be categorized on the basis of energy-efficiency, network hierarchy, and
network types. Interestingly, the implementation issues, e.g., interference,
QoS, handoff, security-privacy, channel access, and load balancing, hugely
effect the realization of 5G networks. Furthermore, our illustrations highlight
the feasibility of these models through an evaluation of existing
real-experiments and testbeds.Comment: Accepted in Elsevier Physical Communication, 24 pages, 5 figures, 2
table
Cloud Computing - Architecture and Applications
In the era of Internet of Things and with the explosive worldwide growth of
electronic data volume, and associated need of processing, analysis, and
storage of such humongous volume of data, it has now become mandatory to
exploit the power of massively parallel architecture for fast computation.
Cloud computing provides a cheap source of such computing framework for large
volume of data for real-time applications. It is, therefore, not surprising to
see that cloud computing has become a buzzword in the computing fraternity over
the last decade. This book presents some critical applications in cloud
frameworks along with some innovation design of algorithms and architecture for
deployment in cloud environment. It is a valuable source of knowledge for
researchers, engineers, practitioners, and graduate and doctoral students
working in the field of cloud computing. It will also be useful for faculty
members of graduate schools and universities.Comment: Edited Volume published by Intech Publishers, Croatia, June 2017. 138
pages. ISBN 978-953-51-3244-8, Print ISBN 978-953-51-3243-1. Link:
https://www.intechopen.com/books/cloud-computing-architecture-and-application
A Survey on Low Latency Towards 5G: RAN, Core Network and Caching Solutions
The fifth generation (5G) wireless network technology is to be standardized
by 2020, where main goals are to improve capacity, reliability, and energy
efficiency, while reducing latency and massively increasing connection density.
An integral part of 5G is the capability to transmit touch perception type
real-time communication empowered by applicable robotics and haptics equipment
at the network edge. In this regard, we need drastic changes in network
architecture including core and radio access network (RAN) for achieving
end-to-end latency on the order of 1 ms. In this paper, we present a detailed
survey on the emerging technologies to achieve low latency communications
considering three different solution domains: RAN, core network, and caching.
We also present a general overview of 5G cellular networks composed of software
defined network (SDN), network function virtualization (NFV), caching, and
mobile edge computing (MEC) capable of meeting latency and other 5G
requirements.Comment: Accepted in IEEE Communications Surveys and Tutorial
Differential Privacy Techniques for Cyber Physical Systems: A Survey
Modern cyber physical systems (CPSs) has widely being used in our daily lives
because of development of information and communication technologies (ICT).With
the provision of CPSs, the security and privacy threats associated to these
systems are also increasing. Passive attacks are being used by intruders to get
access to private information of CPSs. In order to make CPSs data more secure,
certain privacy preservation strategies such as encryption, and k-anonymity
have been presented in the past. However, with the advances in CPSs
architecture, these techniques also needs certain modifications. Meanwhile,
differential privacy emerged as an efficient technique to protect CPSs data
privacy. In this paper, we present a comprehensive survey of differential
privacy techniques for CPSs. In particular, we survey the application and
implementation of differential privacy in four major applications of CPSs named
as energy systems, transportation systems, healthcare and medical systems, and
industrial Internet of things (IIoT). Furthermore, we present open issues,
challenges, and future research direction for differential privacy techniques
for CPSs. This survey can serve as basis for the development of modern
differential privacy techniques to address various problems and data privacy
scenarios of CPSs.Comment: 46 pages, 12 figure
The Role of Big Data Analytics in Industrial Internet of Things
Big data production in industrial Internet of Things (IIoT) is evident due to
the massive deployment of sensors and Internet of Things (IoT) devices.
However, big data processing is challenging due to limited computational,
networking and storage resources at IoT device-end. Big data analytics (BDA) is
expected to provide operational- and customer-level intelligence in IIoT
systems. Although numerous studies on IIoT and BDA exist, only a few studies
have explored the convergence of the two paradigms. In this study, we
investigate the recent BDA technologies, algorithms and techniques that can
lead to the development of intelligent IIoT systems. We devise a taxonomy by
classifying and categorising the literature on the basis of important
parameters (e.g. data sources, analytics tools, analytics techniques,
requirements, industrial analytics applications and analytics types). We
present the frameworks and case studies of the various enterprises that have
benefited from BDA. We also enumerate the considerable opportunities introduced
by BDA in IIoT.We identify and discuss the indispensable challenges that remain
to be addressed as future research directions as well
Exploiting Massive D2D Collaboration for Energy-Efficient Mobile Edge Computing
In this article we propose a novel Device-to-Device (D2D) Crowd framework for
5G mobile edge computing, where a massive crowd of devices at the network edge
leverage the network-assisted D2D collaboration for computation and
communication resource sharing among each other. A key objective of this
framework is to achieve energy-efficient collaborative task executions at
network-edge for mobile users. Specifically, we first introduce the D2D Crowd
system model in details, and then formulate the energy-efficient D2D Crowd task
assignment problem by taking into account the necessary constraints. We next
propose a graph matching based optimal task assignment policy, and further
evaluate its performance through extensive numerical study, which shows a
superior performance of more than 50% energy consumption reduction over the
case of local task executions. Finally, we also discuss the directions of
extending the D2D Crowd framework by taking into variety of application
factors.Comment: Xu Chen, Lingjun Pu, Lin Gao, Weigang Wu, and Di Wu, "Exploiting
Massive D2D Collaboration for Energy-Efficient Mobile Edge Computing,"
accepted by IEEE Wireless Communications, 201
NFV and SDN - Key Technology Enablers for 5G Networks
Communication networks are undergoing their next evolutionary step towards
5G. The 5G networks are envisioned to provide a flexible, scalable, agile and
programmable network platform over which different services with varying
requirements can be deployed and managed within strict performance bounds. In
order to address these challenges a paradigm shift is taking place in the
technologies that drive the networks, and thus their architecture. Innovative
concepts and techniques are being developed to power the next generation mobile
networks. At the heart of this development lie Network Function Virtualization
and Software Defined Networking technologies, which are now recognized as being
two of the key technology enablers for realizing 5G networks, and which have
introduced a major change in the way network services are deployed and
operated. For interested readers that are new to the field of SDN and NFV this
paper provides an overview of both these technologies with reference to the 5G
networks. Most importantly it describes how the two technologies complement
each other and how they are expected to drive the networks of near future.Comment: This is an accepted version and consists of 11 pages, 9 figures and
32 reference
Internet of Things (IoT) and Cloud Computing Enabled Disaster Management
Disaster management demands a near real-time information dissemina-tion so
that the emergency services can be provided to the right people at the right
time. Recent advances in information and communication technologies enable
collection of real-time information from various sources. For example, sensors
deployed in the fields collect data about the environment. Similarly, social
networks like Twitter and Facebook can help to collect data from people in the
disaster zone. On one hand, inadequate situation awareness in disasters has
been identified as one of the primary factors in human errors with grave
consequences such as loss of lives and destruction of critical infrastructure.
On the other hand, the growing ubiquity of social media and mobile devices, and
pervasive nature of the Internet-of-Things means that there are more sources of
outbound traffic, which ultimately results in the creation of a data deluge,
beginning shortly after the onset of disaster events, leading to the problem of
information tsunami. In addition, security and privacy has crucial role to
overcome the misuse of the system for either intrusions into data or overcome
the misuse of the information that was meant for a specified purpose. .... In
this chapter, we provide such a situation aware application to support disaster
management data lifecycle, i.e. from data ingestion and processing to alert
dissemination. We utilize cloud computing, Internet of Things and social
computing technologies to achieve a scalable, effi-cient, and usable
situation-aware application called Cloud4BigData.Comment: Submitted for the book titled "Integration of Cyber-Physical Systems,
Cloud, and Internet of Things
A High-Level Modeling Language for the Efficient Design, Implementation, and Testing of Android Applications
Developing mobile applications remains difficult, time consuming, and
error-prone, in spite of the number of existing platforms and tools. In this
paper, we define MoDroid, a high-level modeling language to ease the
development of Android applications. MoDroid allows developing models
representing the core of applications. MoDroid provides Android programmers
with the following advantages: (1) Models are built using high-level primitives
that abstract away several implementation details; (2) It allows the definition
of interfaces between models to automatically compose them; (3) Java native
android can be automatically generated along with the required permissions; (4)
It supports efficient model-based testing that operates on models. MoDroid is
fully implemented and was used to develop several non-trivial Android
applications.Comment: 12 page
A Survey on Mobile Edge Networks: Convergence of Computing, Caching and Communications
As the explosive growth of smart devices and the advent of many new
applications, traffic volume has been growing exponentially. The traditional
centralized network architecture cannot accommodate such user demands due to
heavy burden on the backhaul links and long latency. Therefore, new
architectures which bring network functions and contents to the network edge
are proposed, i.e., mobile edge computing and caching. Mobile edge networks
provide cloud computing and caching capabilities at the edge of cellular
networks. In this survey, we make an exhaustive review on the state-of-the-art
research efforts on mobile edge networks. We first give an overview of mobile
edge networks including definition, architecture and advantages. Next, a
comprehensive survey of issues on computing, caching and communication
techniques at the network edge is presented respectively. The applications and
use cases of mobile edge networks are discussed. Subsequently, the key enablers
of mobile edge networks such as cloud technology, SDN/NFV and smart devices are
discussed. Finally, open research challenges and future directions are
presented as well
- …