11,372 research outputs found
인프라가 없는 환경에서의 재난 통신망을 위한 동기화 및 그룹 형성 기법
학위논문 (박사)-- 서울대학교 대학원 : 전기·컴퓨터공학부, 2016. 8. 이광복.A public safety network (PSN) has been developed as a special class of wireless communication network that aims to save lives and prevent property damage. PSNs have evolved separately from commercial wireless networks satisfying various requirements and regulatory issues associated with them. With growing needs for the transmission of multimedia data, existing voice-centric PSN technologies are facing hurdles in fulllfilling the demand for high capacity and different types of services. Mission-critical requirements for PSNs include the guaranteed dissemination of emergency information such as alarm texts, images, and videos of disasters even in the absence (or destruction) of cellular infrastructure. Many research projects have been launched to meet the mission-critical requirement of PSN, e.g., Aerial Base Station with Opportunistic Links for Unexpected & TEmporary events (ABSOLUTE), Alert for All (Alert4All), Mobile Alert InformAtion system using satellites (MAIA), and so on. The research projects include the emergency communications using satellite communications, aerial eNodeBs, and terrestrial radio access technologies. The approaches take advantages of inherent broadcasting and resilience with respect to Earth damages for disseminations of alert messages. In this dissertation, we limit our interests to terrestrial radio access technologies, e.g., LTE, TETRA, TETRAPOL, and DMR, because PSNs should be operational even in the low-class user equipments (UEs) that are lack of satellite communication functionalities.
In Chapter 2 of this dissertation, we propose a distributed synchronization algorithm for infrastructure-less public safety networks. The proposed algorithm aims to minimize the number of out-of-sync user equipments by efficiently forming synchronization groups and selecting synchronization reference UEs in a distributed manner. For the purpose, we introduce a novel affinity propagation technique which enables an autonomous decision at each UE based on local message-passing among neighboring UEs. Our simulation results show that the proposed algorithm reduces the number of out-of-sync UEs by up to 40% compared to the conventional scan-and-select strategy. In Chapter 3 of this dissertation, we study an infrastructure-less public safety network where energy efficiency and reliability are critical requirements in the absence of cellular infrastructure, i.e., base stations and wired backbone lines. We formulate the IPSN group formation as a clustering problem. A subset of user equipments, called group owners (GOs), are chosen to serve as virtual base stations, and each non-GO UE, referred to as group member, is associated with a GO as its member. We propose a novel clustering algorithm in the framework of affinity propagation, which is a state- of-the-art message-passing technique with a graphical model approach developed in the machine learning field. Unlike conventional clustering approaches, the proposed clustering algorithm minimizes the total energy consumption while guaranteeing link reliability by adjusting the number of GOs. Simulation results verify that the IPSN optimized by the proposed clustering algorithm reduces the total energy consumption of the network by up to 31% compared to the conventional clustering approaches.Chapter 1 INTRODUCTION 1
1.1 Distributed Synchronization Algorithm for Infrastructure-less Public Safety Networks 2
1.2 Reliable Low-Energy Group Formation for Infrastructure-less Public Safety Networks 3
1.3 Outline of Dissertation 8
1.4 Notations 8
Chapter 2 Distributed Synchronization Algorithm for Infrastructure-less Public Safety Networks 10
2.1 System Model and Problem Formulation 10
2.2 Distributed Synchronization Algorithm based on Message-passing 17
2.2.1 Preliminaries: affinity propagation 17
2.2.2 Distributed Synchronization Algorithm 19
2.3 Distributed Synchronization Procedures 20
2.4 Simulation Results 25
Chapter 3 Reliable Low-Energy Group Formation for Infrastructure-less Public Safety Networks 42
3.1 System Model and Problem Formulation 42
3.1.1 Channel Model and Network Structure 42
3.1.2 ProblemFormulation 44
3.2 Constrained Clustering Algorithm for IPSN 47
3.2.1 Similarity Modeling 47
3.2.2 Proposed Clustering Algorithm 47
3.3 Determination of initial point 51
3.4 Simulation Results 56
Chapter 4 Conclusion and Future Work 72
4.1 Conclusion 72
4.2 Future Work 73
Bibliography 74
Abstract (In Korean) 82Docto
FastPay: High-Performance Byzantine Fault Tolerant Settlement
FastPay allows a set of distributed authorities, some of which are Byzantine,
to maintain a high-integrity and availability settlement system for pre-funded
payments. It can be used to settle payments in a native unit of value
(crypto-currency), or as a financial side-infrastructure to support retail
payments in fiat currencies. FastPay is based on Byzantine Consistent Broadcast
as its core primitive, foregoing the expenses of full atomic commit channels
(consensus). The resulting system has low-latency for both confirmation and
payment finality. Remarkably, each authority can be sharded across many
machines to allow unbounded horizontal scalability. Our experiments demonstrate
intra-continental confirmation latency of less than 100ms, making FastPay
applicable to point of sale payments. In laboratory environments, we achieve
over 80,000 transactions per second with 20 authorities---surpassing the
requirements of current retail card payment networks, while significantly
increasing their robustness
A survey on pseudonym changing strategies for Vehicular Ad-Hoc Networks
The initial phase of the deployment of Vehicular Ad-Hoc Networks (VANETs) has
begun and many research challenges still need to be addressed. Location privacy
continues to be in the top of these challenges. Indeed, both of academia and
industry agreed to apply the pseudonym changing approach as a solution to
protect the location privacy of VANETs'users. However, due to the pseudonyms
linking attack, a simple changing of pseudonym shown to be inefficient to
provide the required protection. For this reason, many pseudonym changing
strategies have been suggested to provide an effective pseudonym changing.
Unfortunately, the development of an effective pseudonym changing strategy for
VANETs is still an open issue. In this paper, we present a comprehensive survey
and classification of pseudonym changing strategies. We then discuss and
compare them with respect to some relevant criteria. Finally, we highlight some
current researches, and open issues and give some future directions
Context-Awareness Enhances 5G Multi-Access Edge Computing Reliability
The fifth generation (5G) mobile telecommunication network is expected to
support Multi- Access Edge Computing (MEC), which intends to distribute
computation tasks and services from the central cloud to the edge clouds.
Towards ultra-responsive, ultra-reliable and ultra-low-latency MEC services,
the current mobile network security architecture should enable a more
decentralized approach for authentication and authorization processes. This
paper proposes a novel decentralized authentication architecture that supports
flexible and low-cost local authentication with the awareness of context
information of network elements such as user equipment and virtual network
functions. Based on a Markov model for backhaul link quality, as well as a
random walk mobility model with mixed mobility classes and traffic scenarios,
numerical simulations have demonstrated that the proposed approach is able to
achieve a flexible balance between the network operating cost and the MEC
reliability.Comment: Accepted by IEEE Access on Feb. 02, 201
Smart Grid Technologies in Europe: An Overview
The old electricity network infrastructure has proven to be inadequate, with respect to modern challenges such as alternative energy sources, electricity demand and energy saving policies. Moreover, Information and Communication Technologies (ICT) seem to have reached an adequate level of reliability and flexibility in order to support a new concept of electricity network—the smart grid. In this work, we will analyse the state-of-the-art of smart grids, in their technical, management, security, and optimization aspects. We will also provide a brief overview of the regulatory aspects involved in the development of a smart grid, mainly from the viewpoint of the European Unio
Distributed Hybrid Simulation of the Internet of Things and Smart Territories
This paper deals with the use of hybrid simulation to build and compose
heterogeneous simulation scenarios that can be proficiently exploited to model
and represent the Internet of Things (IoT). Hybrid simulation is a methodology
that combines multiple modalities of modeling/simulation. Complex scenarios are
decomposed into simpler ones, each one being simulated through a specific
simulation strategy. All these simulation building blocks are then synchronized
and coordinated. This simulation methodology is an ideal one to represent IoT
setups, which are usually very demanding, due to the heterogeneity of possible
scenarios arising from the massive deployment of an enormous amount of sensors
and devices. We present a use case concerned with the distributed simulation of
smart territories, a novel view of decentralized geographical spaces that,
thanks to the use of IoT, builds ICT services to manage resources in a way that
is sustainable and not harmful to the environment. Three different simulation
models are combined together, namely, an adaptive agent-based parallel and
distributed simulator, an OMNeT++ based discrete event simulator and a
script-language simulator based on MATLAB. Results from a performance analysis
confirm the viability of using hybrid simulation to model complex IoT
scenarios.Comment: arXiv admin note: substantial text overlap with arXiv:1605.0487
- …