1,713 research outputs found

    Vehicular Wireless Communication Standards: Challenges and Comparison

    Get PDF
    Autonomous vehicles (AVs) are the future of mobility. Safe and reliable AVs are required for widespread adoption by a community which is only possible if these AVs can communicate with each other & with other entities in a highly efficient way. AVs require ultra-reliable communications for safety-critical applications to ensure safe driving. Existing vehicular communication standards, i.e., IEEE 802.11p (DSRC), ITS-G5, & LTE, etc., do not meet the requirements of high throughput, ultra-high reliability, and ultra-low latency along with other issues. To address these challenges, IEEE 802.11bd & 5G NR-V2X standards provide more efficient and reliable communication, however, these standards are in the developing stage. Existing literature generally discusses the features of these standards only and does not discuss the drawbacks. Similarly, existing literature does not discuss the comparison between these standards or discusses a comparison between any two standards only. However, this work comprehensively describes different issues/challenges faced by these standards. This work also comprehensively provides a comparison among these standards along with their salient features. The work also describes spectrum management issues comprehensively, i.e., interoperability issues, co-existence with Wi-Fi, etc. The work also describes different other issues comprehensively along with recommendations. The work describes that 802.11bd and 5G NR are the two potential future standards for efficient vehicle communications; however, these standards must be able to provide backward compatibility, interoperability, and co-existence with current and previous standards

    A survey on short-range WBAN communication; technical overview of several standard wireless technologies

    Get PDF
    In a healthy environment, a WBAN system is the key component or aspect of the patient monitoring system. WBAN systems allow for easy networking with other devices and networks so that healthcare professionals can easily access critical and non-critical patient data. One of the main advantages of WBAN is the remote monitoring of patients using an Intranet or the Internet. There are two main components to the type of communication technology used in WBAN. This page shows an insight of a variety of short-range standardized wireless devices, as well as a taxonomy of short-range technologies. These are proposed as intra-BAN communication candidates for communication within and between body area network (BAN) entities. This paper also highlights the advantages and disadvantages of the WBAN perspective. Finally, a side-by-side comparison of the basic principles of using MICS frequency bands and preparatory technologies

    An overview of bluetooth device discovery and fingerprinting techniques – assessing the local context

    Get PDF
    The ubiquitous nature of portable communication devices presents a number of opportunities for automated device discovery, tracking and possible owner identification. Consumer devices such as smartphones, tablets, wearables, laptops and vehicle entertainment systems commonly support the 802.15.1 (Bluetooth) wireless communication protocol that enables a variety device discovery and fingerprinting techniques. We provide an overview of these techniques encompassing those native to the protocol as well as those that are possibly protocol-agnostic due to their inherently generic nature. We then introduce an opportunity for a comparison study that sets out to examine and quantify the effectiveness of selected techniques in the field. To assess the potential viability of such study in the local context, we employ location-aware inquiry scanning and discuss the results of the exploratory data collection. We conclude that in this context the simplest technique being inquiry scanning can be used to establish a baseline for comparison with other techniques

    Practical privacy enhancing technologies for mobile systems

    Get PDF
    Mobile computers and handheld devices can be used today to connect to services available on the Internet. One of the predominant technologies in this respect for wireless Internet connection is the IEEE 802.11 family of WLAN standards. In many countries, WLAN access can be considered ubiquitous; there is a hotspot available almost anywhere. Unfortunately, the convenience provided by wireless Internet access has many privacy tradeoffs that are not obvious to mobile computer users. In this thesis, we investigate the lack of privacy of mobile computer users, and propose practical enhancements to increase the privacy of these users. We show how explicit information related to the users' identity leaks on all layers of the protocol stack. Even before an IP address is configured, the mobile computer may have already leaked their affiliation and other details to the local network as the WLAN interface openly broadcasts the networks that the user has visited. Free services that require authentication or provide personalization, such as online social networks, instant messengers, or web stores, all leak the user's identity. All this information, and much more, is available to a local passive observer using a mobile computer. In addition to a systematic analysis of privacy leaks, we have proposed four complementary privacy protection mechanisms. The main design guidelines for the mechanisms have been deployability and the introduction of minimal changes to user experience. More specifically, we mitigate privacy problems introduced by the standard WLAN access point discovery by designing a privacy-preserving access-point discovery protocol, show how a mobility management protocol can be used to protect privacy, and how leaks on all layers of the stack can be reduced by network location awareness and protocol stack virtualization. These practical technologies can be used in designing a privacy-preserving mobile system or can be retrofitted to current systems

    OCC Future and Obstacles under 5g Requirements

    Get PDF
    Telecommunications specifications of the fifth-generation (5 G) are being established to satisfy the rising demands of high-speed broadband networks (i.e., a few tens of Gigabits every second). The 5 G standard derives primarily from a rising number of subscribers and a multitude of various apps, commonly referred to as smart devices, communicating as part of Internet-of-Things (IoT) network For 5 G, a few possible developments such as millimeter waves, large multiple-input multiple-output, and small cell connectivity have appeared. While such technologies will meet 5 G specifications, attention is being given to a complementary potential wireless optical wireless communication (OWC) system. Clear light contact (VLC) as part of OWC. Among the most desirable solutions for 5 G networks and beyond are optical camera communications (OCCs). As part of future smart cities, VLC with huge frequency spectrum integrated with IoT that opens up a broad range of indoor and outdoor applications. This paper gives a description of the VLC-centric all-optical IoT and Potential implementations and issues centered on OCC under 5 G Requirement

    Seamless connectivity architecture and methods for IoT and wearable devices

    Get PDF
    Wearable and Internet of Things (IoT) devices have the potential to improve lifestyle, personalize receiving treatments or introduce assisted living for elderly people. However, service delivery depends on maintaining and troubleshooting device connectivity to smartphones, where user engagement and technology proficiency represent a possible barrier that prevents a wider adoption, especially in the elderly and disabled population. Low-cost and low-power wearable and IoT devices face challenges when operating out of range of known home networks or pared devices. We propose an architecture and methods to provide seamless connectivity (Se-Co) between devices and wireless networks while maintaining low-power, low-cost and standards compatibility. Through Se-Co, the devices connect without user interaction both in home and in unknown roaming networks while maintaining anonymity, privacy and security. Roaming networks approve data limited connectivity to unknown devices that are able to provide a valid anonymized certificate of compliance and no harm through a home provider. Se-Co enables shifting data processing, such as pattern processing using artificial intelligence, from a wearable device or smartphone towards the cloud. The proposed Se-Co architecture could provide solutions to increase usability of wearable devices and improve their wider adoption, while keeping low the costs of devices, development and services
    corecore