124 research outputs found

    5G NR sidelink on UE protocol stack

    Get PDF
    Abstract. The idea of effcient communication outside of coverage of base stations have been discussed for a long time. The most suitable solution for this idea has been the ability to extend the communication through devices. In theory, it would be necessary for just one device to be in the coverage of the base station, and the communication could be further extended by hopping from device to device. These communications are called device-to-device communications. Multiple different technologies could be used to solve this task, such as Wi-Fi, Bluetooth and sidelink. Especially when it comes to high mobility and reliability dependent use cases, technologies such as Wi-Fi are simply not capable. This is where the sidelink technology comes in. The sidelink is a communication technology that allows devices to communicate with each other directly, without the need for a cellular network. This technology utilizes the frequency spectrum and enables high-speed, low-latency communication between devices. It has numerous potential applications, including vehicle-to-vehicle communication, machine-type communication, and local area networking. In this thesis, technical characteristics of 5G NR sidelink and its potential applications and challenges are considered. The overview of the ongoing standardization efforts and the deployment status of this technology are discussed. The effciency of the sidelink technology is evaluated and compared to the existing technologies. The sidelink related future updates are discussed and their effect on the current specifcation is evaluated.5G NR sidelink -käyttäjäpäätteen protokollapino. Tiivistelmä. Tukiasemien kantavuuden ulkopuolelle yltävistä verkkoyhteyksistä on keskusteltu jo pitkään. Potentiaalisesti toimivin ratkaisu olisi kasvattaa kantavuutta kannettavien laitteiden kautta. Teoriassa tukiaseman kantaman sisällä tarvitaan vain yksi laite, jonka avulla yhteys voitaisiin kuljettaa laitteelta toiselle tukiaseman kantaman ulkopuolella. Tämänlaisia yhteyksiä kutsutaan suoriksi laitteelta laitteelle yhteyksiksi. Kyseiset yhteydet voitaisiin toteuttaa useilla eri teknologioilla, kuten Wi-Fi:llä, Bluetooth:lla tai sidelink:llä. Erityisesti suurta liikkuvuutta ja luotettavuutta vaativiin käyttökohteisiin Wi-Fi ei ole riittävän tehokas. Tämänlaisissa käyttökohteissa sidelink voisi toimia sopivana Wi-Fi:n korvaajana. Sidelink-teknologia antaa laitteille mahdollisuuden kommunikoida suoraan toistensa kanssa. Nämä yhteydet eivät vaadi matkapuhelinverkkoa toimiakseen. Sidelink-teknologialla mahdollistetaan nopeat, luotettavat ja matalan latenssin yhteydet laitteiden välillä. Sidelink mahdollistaa useita moderneja käyttökohteita, kuten ajoneuvojen väliset yhteydet. Tässä diplomityössä sidelinkin ominaisuuksia käydään läpi. Potentiaalisia sovellutuksista ja teknologiaan liittyvistä haasteista keskustellaan. Käynnissä olevat standardisoinnit käydään tärkeimmiltä osiltaan läpi. Sidelink-teknologian toimivuutta verrataan olemassa oleviin vastaaviin teknologioihin. Myös LTE ja NR versioiden eroja käydään läpi. Myös tulevia muutoksia ja standardisointeja tarkastellaan

    A PUF-and biometric-based lightweight hardware solution to increase security at sensor nodes

    Get PDF
    Security is essential in sensor nodes which acquire and transmit sensitive data. However, the constraints of processing, memory and power consumption are very high in these nodes. Cryptographic algorithms based on symmetric key are very suitable for them. The drawback is that secure storage of secret keys is required. In this work, a low-cost solution is presented to obfuscate secret keys with Physically Unclonable Functions (PUFs), which exploit the hardware identity of the node. In addition, a lightweight fingerprint recognition solution is proposed, which can be implemented in low-cost sensor nodes. Since biometric data of individuals are sensitive, they are also obfuscated with PUFs. Both solutions allow authenticating the origin of the sensed data with a proposed dual-factor authentication protocol. One factor is the unique physical identity of the trusted sensor node that measures them. The other factor is the physical presence of the legitimate individual in charge of authorizing their transmission. Experimental results are included to prove how the proposed PUF-based solution can be implemented with the SRAMs of commercial Bluetooth Low Energy (BLE) chips which belong to the communication module of the sensor node. Implementation results show how the proposed fingerprint recognition based on the novel texture-based feature named QFingerMap16 (QFM) can be implemented fully inside a low-cost sensor node. Robustness, security and privacy issues at the proposed sensor nodes are discussed and analyzed with experimental results from PUFs and fingerprints taken from public and standard databases.Ministerio de Economía, Industria y Competitividad TEC2014-57971-R, TEC2017-83557-

    Municipal wireless mesh networks as a competitive broadband delivery platform

    Get PDF
    Thesis (S.M.)--Massachusetts Institute of Technology, System Design and Management Program, 2007.Includes bibliographical references (p. 119-122).Recently there has been a growing interest in deploying Wireless Mesh Networks by municipalities. This interest stems from the desire to provide broadband connectivity to users lacking access to broadband alternatives. The ubiquity of these networks will create more opportunities for new wireless-based applications and services that will generate revenue to the local businesses. The current plan is primarily focusing on the use of the WiFi, which was originally designed for indoor LAN applications operating in unlicensed spectrum. Also, the Municipalities claim that their main targets are Public Safety and the low-income neighborhood that cannot afford DSL or Cable broadband. There is a doubt, however, that the current plan will deliver on its promises in terms of coverage as well as cost. In this research, the goal is to first study the current business model for the current Municipal Wireless Mesh networks under deployment. As such, we will attempt to examine the networks under development in Brookline, Boston, Cambridge, and other cities in the US. We will also examine the technical limitations of these networks. This will lead us to suggest modifications to both the business model and a new system design. The goal for these modifications is to enhance the chance of these networks to succeed in the market place.by Mudhafar Hassan-Ali.S.M

    Unified Role Assignment Framework For Wireless Sensor Networks

    Get PDF
    Wireless sensor networks are made possible by the continuing improvements in embedded sensor, VLSI, and wireless radio technologies. Currently, one of the important challenges in sensor networks is the design of a systematic network management framework that allows localized and collaborative resource control uniformly across all application services such as sensing, monitoring, tracking, data aggregation, and routing. The research in wireless sensor networks is currently oriented toward a cross-layer network abstraction that supports appropriate fine or course grained resource controls for energy efficiency. In that regard, we have designed a unified role-based service paradigm for wireless sensor networks. We pursue this by first developing a Role-based Hierarchical Self-Organization (RBSHO) protocol that organizes a connected dominating set (CDS) of nodes called dominators. This is done by hierarchically selecting nodes that possess cumulatively high energy, connectivity, and sensing capabilities in their local neighborhood. The RBHSO protocol then assigns specific tasks such as sensing, coordination, and routing to appropriate dominators that end up playing a certain role in the network. Roles, though abstract and implicit, expose role-specific resource controls by way of role assignment and scheduling. Based on this concept, we have designed a Unified Role-Assignment Framework (URAF) to model application services as roles played by local in-network sensor nodes with sensor capabilities used as rules for role identification. The URAF abstracts domain specific role attributes by three models: the role energy model, the role execution time model, and the role service utility model. The framework then generalizes resource management for services by providing abstractions for controlling the composition of a service in terms of roles, its assignment, reassignment, and scheduling. To the best of our knowledge, a generic role-based framework that provides a simple and unified network management solution for wireless sensor networks has not been proposed previously

    Smart Wireless Sensor Networks

    Get PDF
    The recent development of communication and sensor technology results in the growth of a new attractive and challenging area - wireless sensor networks (WSNs). A wireless sensor network which consists of a large number of sensor nodes is deployed in environmental fields to serve various applications. Facilitated with the ability of wireless communication and intelligent computation, these nodes become smart sensors which do not only perceive ambient physical parameters but also be able to process information, cooperate with each other and self-organize into the network. These new features assist the sensor nodes as well as the network to operate more efficiently in terms of both data acquisition and energy consumption. Special purposes of the applications require design and operation of WSNs different from conventional networks such as the internet. The network design must take into account of the objectives of specific applications. The nature of deployed environment must be considered. The limited of sensor nodes� resources such as memory, computational ability, communication bandwidth and energy source are the challenges in network design. A smart wireless sensor network must be able to deal with these constraints as well as to guarantee the connectivity, coverage, reliability and security of network's operation for a maximized lifetime. This book discusses various aspects of designing such smart wireless sensor networks. Main topics includes: design methodologies, network protocols and algorithms, quality of service management, coverage optimization, time synchronization and security techniques for sensor networks

    Resource Allocation based on Federated Learning for Next Generation Wireless Communication

    Get PDF
    Federated Learning (FL) stands out as a decentralized Machine Learning (ML) method that enables model training using distributed data while safeguarding data privacy. Its application in the next-generation wireless communication, especially the Internet of Things (IoT), realm has the potential to provide more intelligent and efficient solutions for addressing the challenges posed by massive data and security concerns. However, the performance of wireless FL is often hampered by constraints related to wireless communication resources and participant mobility. To address this issue, this thesis proposes a scheduling strategy based on model quality and communication quality. The strategy employs interpretable ML to assess the contribution of each local model to the convergence of the global model and adjusts the weights of model quality and training participant communication quality dynamically, called dynamical balance quality, to achieve a more efficient and fair resource allocation strategy. Finally, the thesis compares the proposed strategy with traditional ones, and simulation results demonstrate that analyzing the value of local models using Interpretable Machine Learning techniques can help maximize the overall learning efficiency of FL systems. Furthermore, this thesis delves into the practical applications of wireless IoT and federated systems. I have designed a distributed federated IoT system framework tailored to the healthcare sector, encompassing a contactless health self-check-in web application, thermal imaging cameras, and physical barriers. This integrated system streamlines the COVID-19 health screening and data recording process. Through collaboration with a major urban hospital in Australia, we implemented a pilot electronic gate solution

    Prediction assisted fast handovers for seamless IP mobility

    Get PDF
    Word processed copy.Includes bibliographical references (leaves 94-98).This research investigates the techniques used to improve the standard Mobile IP handover process and provide proactivity in network mobility management. Numerous fast handover proposals in the literature have recently adopted a cross-layer approach to enhance movement detection functionality and make terminal mobility more seamless. Such fast handover protocols are dependent on an anticipated link-layer trigger or pre-trigger to perform pre-handover service establishment operations. This research identifies the practical difficulties involved in implementing this type of trigger and proposes an alternative solution that integrates the concept of mobility prediction into a reactive fast handover scheme
    corecore