323 research outputs found
A Survey on the Security and the Evolution of Osmotic and Catalytic Computing for 5G Networks
The 5G networks have the capability to provide high compatibility for the new
applications, industries, and business models. These networks can tremendously
improve the quality of life by enabling various use cases that require high
data-rate, low latency, and continuous connectivity for applications pertaining
to eHealth, automatic vehicles, smart cities, smart grid, and the Internet of
Things (IoT). However, these applications need secure servicing as well as
resource policing for effective network formations. There have been a lot of
studies, which emphasized the security aspects of 5G networks while focusing
only on the adaptability features of these networks. However, there is a gap in
the literature which particularly needs to follow recent computing paradigms as
alternative mechanisms for the enhancement of security. To cover this, a
detailed description of the security for the 5G networks is presented in this
article along with the discussions on the evolution of osmotic and catalytic
computing-based security modules. The taxonomy on the basis of security
requirements is presented, which also includes the comparison of the existing
state-of-the-art solutions. This article also provides a security model,
"CATMOSIS", which idealizes the incorporation of security features on the basis
of catalytic and osmotic computing in the 5G networks. Finally, various
security challenges and open issues are discussed to emphasize the works to
follow in this direction of research.Comment: 34 pages, 7 tables, 7 figures, Published In 5G Enabled Secure
Wireless Networks, pp. 69-102. Springer, Cham, 201
Dynamic spectrum management with network function virtualization for UAV communication
Rapid increases in unmanned aerial vehicles (UAVs) applications are attributed to severe spectrum collision issues, especially when UAVs operate in spectrum scarce environments, such as urban areas. Dynamic air-to-ground (A2G) link solutions can mitigate this issue by utilizing programmable communication hardware in the air and real-time assignment of spectrum resources to achieve high-throughput and low-latency connectivity between UAVs and operators. To mitigate the high-computation issue among ground control station (GCS) networks and provide a broad communication coverage for large number of UAVs, we propose an advanced UAV A2G communication solution integrated with the dynamic spectrum management (DSM) and network function virtualization (NFV) technology to serve urban operations. The edge-cutting UAV communication technologies are surveyed. The proposed scheme is discussed in terms of the high-level system architecture, virtual network architecture, specific virtual functions (SVFs), and affiliated operation support databases. Some major research challenges are highlighted and the possible directions of future research are identified
White Paper for Research Beyond 5G
The documents considers both research in the scope of evolutions of the 5G systems (for the period around 2025) and some alternative/longer term views (with later outcomes, or leading to substantial different design choices). This document reflects on four main system areas: fundamental theory and technology, radio and spectrum management; system design; and alternative concepts. The result of this exercise can be broken in two different strands: one focused in the evolution of technologies that are already ongoing development for 5G systems, but that will remain research areas in the future (with “more challenging” requirements and specifications); the other, highlighting technologies that are not really considered for deployment today, or that will be essential for addressing problems that are currently non-existing, but will become apparent when 5G systems begin their widespread deployment
Emerging Communications for Wireless Sensor Networks
Wireless sensor networks are deployed in a rapidly increasing number of arenas, with uses ranging from healthcare monitoring to industrial and environmental safety, as well as new ubiquitous computing devices that are becoming ever more pervasive in our interconnected society. This book presents a range of exciting developments in software communication technologies including some novel applications, such as in high altitude systems, ground heat exchangers and body sensor networks. Authors from leading institutions on four continents present their latest findings in the spirit of exchanging information and stimulating discussion in the WSN community worldwide
Energy-efficient Transitional Near-* Computing
Studies have shown that communication networks, devices accessing the Internet, and data centers account for 4.6% of the worldwide electricity consumption.
Although data centers, core network equipment, and mobile devices are getting more energy-efficient, the amount of data that is being processed, transferred, and stored is vastly increasing.
Recent computer paradigms, such as fog and edge computing, try to improve this situation by processing data near the user, the network, the devices, and the data itself.
In this thesis, these trends are summarized under the new term near-* or near-everything computing.
Furthermore, a novel paradigm designed to increase the energy efficiency of near-* computing is proposed: transitional computing.
It transfers multi-mechanism transitions, a recently developed paradigm for a highly adaptable future Internet, from the field of communication systems to computing systems.
Moreover, three types of novel transitions are introduced to achieve gains in energy efficiency in near-* environments, spanning from private Infrastructure-as-a-Service (IaaS) clouds, Software-defined Wireless Networks (SDWNs) at the edge of the network, Disruption-Tolerant Information-Centric Networks (DTN-ICNs) involving mobile devices, sensors, edge devices as well as programmable components on a mobile System-on-a-Chip (SoC).
Finally, the novel idea of transitional near-* computing for emergency response applications is presented
to assist rescuers and affected persons during an emergency event or a disaster, although connections to cloud services and social networks might be disturbed by network outages, and network bandwidth and battery power of mobile devices might be limited
- …