882 research outputs found
Regulatory and Policy Implications of Emerging Technologies to Spectrum Management
This paper provides an overview of the policy implications of technological developments, and how these technologies can accommodate an increased level of market competition. It is based on the work carried out in the SPORT VIEWS (Spectrum Policies and Radio Technologies Viable In Emerging Wireless Societies) research project for the European Commission (FP6)spectrum, new radio technologies, UWB, SDR, cognitive radio, Telecommunications, regulation, Networks, Interconnection
Wireless Sensor Technology Selection for I4.0 Manufacturing Systems
The term smart manufacturing has surfaced as an industrial revolution in Germany known as Industry 4.0 (I4.0); this revolution aims to help the manufacturers adapt to turbulent market trends. Its main scope is implementing machine communication, both vertically and horizontally across the manufacturing hierarchy through Internet of things (IoT), technologies and servitization concepts. The main objective of this research is to help manufacturers manage the high levels of variety and the extreme turbulence of market trends through developing a selection tool that utilizes Analytic Hierarchy Process (AHP) techniques to recommend a suitable industrial wireless sensor network (IWSN) technology that fits their manufacturing requirements.In this thesis, IWSN technologies and their properties were identified, analyzed and compared to identify their potential suitability for different industrial manufacturing system application areas. The study included the identification and analysis of different industrial system types, their application areas, scenarios and respective communication requirements. The developed toolâs sensitivity is also tested to recommend different IWSN technology options with changing influential factors. Also, a prioritizing protocol is introduced in the case where more than one IWSN technology options are recommended by the AHP tool.A real industrial case study with the collaboration of SPM Automation Inc. is presented, where the industrial systemsâ class, communication traffic types, and communication requirements were analyzed to recommend a suitable IWSN technology that fits their requirements and assists their shift towards I4.0 through utilizing AHP techniques. The results of this research will serve as a step forward, in the transformation process of manufacturing towards a more digitalized and better connected cyber-physical systems; thus, enhancing manufacturing attributes such as flexibility, reconfigurability, scalability and easing the shift towards implementing I4.0
Ultra wideband: applications, technology and future perspectives
Ultra Wide Band (UWB) wireless communications offers a radically different approach to wireless communication compared to conventional narrow band systems. Global interest in the technology is huge. This paper reports on the state of the art of UWB wireless technology and highlights key application areas, technological challenges, higher layer protocol issues, spectrum operating zones and future drivers. The majority of the discussion focuses on the state of the art of UWB technology as it is today and in the near future
Wireless Technologies for Industry 4.0 Applications
Wireless technologies are increasingly used in industrial applications. These technologies reduce cabling, which is costly and troublesome, and introduce several benefits for their application in terms of flexibility to modify the layout of the nodes and scaling of the number of connected devices. They may also introduce new functionalities since they ease the connections to mobile devices or parts. Although they have some drawbacks, they are increasingly accepted in industrial applications, especially for monitoring and supervision tasks. Recently, they are starting to be accepted even for time-critical tasks, for example, in closed-loop control systems involving slow dynamic processes. However, wireless technologies have been evolving very quickly during the last few years, since several relevant technologies are available in the market. For this reason, it may become difficult to select the best alternative. This perspective article intends to guide application designers to choose the most appropriate technology in each case. For this purpose, this article discusses the most relevant wireless technologies in the industry and shows different examples of applications
Wireless body sensor networks for health-monitoring applications
This is an author-created, un-copyedited version of an article accepted for publication in
Physiological Measurement. The publisher is
not responsible for any errors or omissions in this version of the manuscript or any version
derived from it. The Version of Record is available online at http://dx.doi.org/10.1088/0967-3334/29/11/R01
A Performance-to-Cost Analysis of IEEE 802.15.4 MAC With 802.15.4e MAC Modes
[EN] The IEEE 802.15.4 standard is one of the widely adopted networking specification for Internet of Things (IoT). It defines several physical layer (PHY) options and medium access control (MAC) sub-layer protocols for interconnection of constrained wireless devices. These devices are usually battery-powered and need to support requirements like low-power consumption and low-data rates. The standard has been revised twice to incorporate new PHY layers and improvements learned from implementations. Research in this direction has been primarily centered around improving the energy consumption of devices. Recently, to meet specific Quality-of-Service (QoS) requirements of different industrial applications, the IEEE 802.15.4e amendment was released that focuses on improving reliability, robustness and latency. In this paper, we carry out a performance-to-cost analysis of Deterministic and Synchronous Multi-channel Extension (DSME) and Time-slotted Channel Hopping (TSCH) MAC modes of IEEE 802.15.4e with 802.15.4 MAC protocol to analyze the trade-off of choosing a particular MAC mode over others. The parameters considered for performance are throughput and latency, and the cost is quantified in terms of energy. A Markov model has been developed for TSCH MAC mode to compare its energy costs with 802.15.4 MAC. Finally, we present the applicability of different MAC modes to different application scenarios.This work was supported in part by the SERB, DST, Government of India under Grant ECRA/2016/001651.Choudhury, N.; Matam, R.; Mukherjee, M.; Lloret, J. (2020). A Performance-to-Cost Analysis of IEEE 802.15.4 MAC With 802.15.4e MAC Modes. IEEE Access. 8:41936-41950. https://doi.org/10.1109/ACCESS.2020.2976654S4193641950
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
Delay Analysis of Network Architectures for Machine-to-Machine Communications in LTE System
Machine-to-machine communications has emerged to provide autonomic communications for a wide variety of intelligentservices and applications. Among different communication technologies available for connecting machines, cellular-basedsystems have gained more attention as backhaul networks due to ubiquitous coverage and mobility support. The diverse ranges of service requirements as well as machine constraints require adopting different network architectures. This paper reviews three M2M network architectures to integrate machines into the LTE system and analyzes their associated communication delays. It also presents how the appropriate networks can be selected for some machine-to-machine applications, fulfilling their latency constraints.Peer reviewe
- âŠ