11,372 research outputs found

    인프라가 없는 환경에서의 재난 통신망을 위한 동기화 및 그룹 형성 기법

    Get PDF
    학위논문 (박사)-- 서울대학교 대학원 : 전기·컴퓨터공학부, 2016. 8. 이광복.A public safety network (PSN) has been developed as a special class of wireless communication network that aims to save lives and prevent property damage. PSNs have evolved separately from commercial wireless networks satisfying various requirements and regulatory issues associated with them. With growing needs for the transmission of multimedia data, existing voice-centric PSN technologies are facing hurdles in fulllfilling the demand for high capacity and different types of services. Mission-critical requirements for PSNs include the guaranteed dissemination of emergency information such as alarm texts, images, and videos of disasters even in the absence (or destruction) of cellular infrastructure. Many research projects have been launched to meet the mission-critical requirement of PSN, e.g., Aerial Base Station with Opportunistic Links for Unexpected & TEmporary events (ABSOLUTE), Alert for All (Alert4All), Mobile Alert InformAtion system using satellites (MAIA), and so on. The research projects include the emergency communications using satellite communications, aerial eNodeBs, and terrestrial radio access technologies. The approaches take advantages of inherent broadcasting and resilience with respect to Earth damages for disseminations of alert messages. In this dissertation, we limit our interests to terrestrial radio access technologies, e.g., LTE, TETRA, TETRAPOL, and DMR, because PSNs should be operational even in the low-class user equipments (UEs) that are lack of satellite communication functionalities. In Chapter 2 of this dissertation, we propose a distributed synchronization algorithm for infrastructure-less public safety networks. The proposed algorithm aims to minimize the number of out-of-sync user equipments by efficiently forming synchronization groups and selecting synchronization reference UEs in a distributed manner. For the purpose, we introduce a novel affinity propagation technique which enables an autonomous decision at each UE based on local message-passing among neighboring UEs. Our simulation results show that the proposed algorithm reduces the number of out-of-sync UEs by up to 40% compared to the conventional scan-and-select strategy. In Chapter 3 of this dissertation, we study an infrastructure-less public safety network where energy efficiency and reliability are critical requirements in the absence of cellular infrastructure, i.e., base stations and wired backbone lines. We formulate the IPSN group formation as a clustering problem. A subset of user equipments, called group owners (GOs), are chosen to serve as virtual base stations, and each non-GO UE, referred to as group member, is associated with a GO as its member. We propose a novel clustering algorithm in the framework of affinity propagation, which is a state- of-the-art message-passing technique with a graphical model approach developed in the machine learning field. Unlike conventional clustering approaches, the proposed clustering algorithm minimizes the total energy consumption while guaranteeing link reliability by adjusting the number of GOs. Simulation results verify that the IPSN optimized by the proposed clustering algorithm reduces the total energy consumption of the network by up to 31% compared to the conventional clustering approaches.Chapter 1 INTRODUCTION 1 1.1 Distributed Synchronization Algorithm for Infrastructure-less Public Safety Networks 2 1.2 Reliable Low-Energy Group Formation for Infrastructure-less Public Safety Networks 3 1.3 Outline of Dissertation 8 1.4 Notations 8 Chapter 2 Distributed Synchronization Algorithm for Infrastructure-less Public Safety Networks 10 2.1 System Model and Problem Formulation 10 2.2 Distributed Synchronization Algorithm based on Message-passing 17 2.2.1 Preliminaries: affinity propagation 17 2.2.2 Distributed Synchronization Algorithm 19 2.3 Distributed Synchronization Procedures 20 2.4 Simulation Results 25 Chapter 3 Reliable Low-Energy Group Formation for Infrastructure-less Public Safety Networks 42 3.1 System Model and Problem Formulation 42 3.1.1 Channel Model and Network Structure 42 3.1.2 ProblemFormulation 44 3.2 Constrained Clustering Algorithm for IPSN 47 3.2.1 Similarity Modeling 47 3.2.2 Proposed Clustering Algorithm 47 3.3 Determination of initial point 51 3.4 Simulation Results 56 Chapter 4 Conclusion and Future Work 72 4.1 Conclusion 72 4.2 Future Work 73 Bibliography 74 Abstract (In Korean) 82Docto

    FastPay: High-Performance Byzantine Fault Tolerant Settlement

    Get PDF
    FastPay allows a set of distributed authorities, some of which are Byzantine, to maintain a high-integrity and availability settlement system for pre-funded payments. It can be used to settle payments in a native unit of value (crypto-currency), or as a financial side-infrastructure to support retail payments in fiat currencies. FastPay is based on Byzantine Consistent Broadcast as its core primitive, foregoing the expenses of full atomic commit channels (consensus). The resulting system has low-latency for both confirmation and payment finality. Remarkably, each authority can be sharded across many machines to allow unbounded horizontal scalability. Our experiments demonstrate intra-continental confirmation latency of less than 100ms, making FastPay applicable to point of sale payments. In laboratory environments, we achieve over 80,000 transactions per second with 20 authorities---surpassing the requirements of current retail card payment networks, while significantly increasing their robustness

    A survey on pseudonym changing strategies for Vehicular Ad-Hoc Networks

    Full text link
    The initial phase of the deployment of Vehicular Ad-Hoc Networks (VANETs) has begun and many research challenges still need to be addressed. Location privacy continues to be in the top of these challenges. Indeed, both of academia and industry agreed to apply the pseudonym changing approach as a solution to protect the location privacy of VANETs'users. However, due to the pseudonyms linking attack, a simple changing of pseudonym shown to be inefficient to provide the required protection. For this reason, many pseudonym changing strategies have been suggested to provide an effective pseudonym changing. Unfortunately, the development of an effective pseudonym changing strategy for VANETs is still an open issue. In this paper, we present a comprehensive survey and classification of pseudonym changing strategies. We then discuss and compare them with respect to some relevant criteria. Finally, we highlight some current researches, and open issues and give some future directions

    Context-Awareness Enhances 5G Multi-Access Edge Computing Reliability

    Get PDF
    The fifth generation (5G) mobile telecommunication network is expected to support Multi- Access Edge Computing (MEC), which intends to distribute computation tasks and services from the central cloud to the edge clouds. Towards ultra-responsive, ultra-reliable and ultra-low-latency MEC services, the current mobile network security architecture should enable a more decentralized approach for authentication and authorization processes. This paper proposes a novel decentralized authentication architecture that supports flexible and low-cost local authentication with the awareness of context information of network elements such as user equipment and virtual network functions. Based on a Markov model for backhaul link quality, as well as a random walk mobility model with mixed mobility classes and traffic scenarios, numerical simulations have demonstrated that the proposed approach is able to achieve a flexible balance between the network operating cost and the MEC reliability.Comment: Accepted by IEEE Access on Feb. 02, 201

    Smart Grid Technologies in Europe: An Overview

    Get PDF
    The old electricity network infrastructure has proven to be inadequate, with respect to modern challenges such as alternative energy sources, electricity demand and energy saving policies. Moreover, Information and Communication Technologies (ICT) seem to have reached an adequate level of reliability and flexibility in order to support a new concept of electricity network—the smart grid. In this work, we will analyse the state-of-the-art of smart grids, in their technical, management, security, and optimization aspects. We will also provide a brief overview of the regulatory aspects involved in the development of a smart grid, mainly from the viewpoint of the European Unio

    Distributed Hybrid Simulation of the Internet of Things and Smart Territories

    Full text link
    This paper deals with the use of hybrid simulation to build and compose heterogeneous simulation scenarios that can be proficiently exploited to model and represent the Internet of Things (IoT). Hybrid simulation is a methodology that combines multiple modalities of modeling/simulation. Complex scenarios are decomposed into simpler ones, each one being simulated through a specific simulation strategy. All these simulation building blocks are then synchronized and coordinated. This simulation methodology is an ideal one to represent IoT setups, which are usually very demanding, due to the heterogeneity of possible scenarios arising from the massive deployment of an enormous amount of sensors and devices. We present a use case concerned with the distributed simulation of smart territories, a novel view of decentralized geographical spaces that, thanks to the use of IoT, builds ICT services to manage resources in a way that is sustainable and not harmful to the environment. Three different simulation models are combined together, namely, an adaptive agent-based parallel and distributed simulator, an OMNeT++ based discrete event simulator and a script-language simulator based on MATLAB. Results from a performance analysis confirm the viability of using hybrid simulation to model complex IoT scenarios.Comment: arXiv admin note: substantial text overlap with arXiv:1605.0487
    corecore