7 research outputs found

    Security layers and related services within the Horizon Europe NEUROPULS project

    Full text link
    In the contemporary security landscape, the incorporation of photonics has emerged as a transformative force, unlocking a spectrum of possibilities to enhance the resilience and effectiveness of security primitives. This integration represents more than a mere technological augmentation; it signifies a paradigm shift towards innovative approaches capable of delivering security primitives with key properties for low-power systems. This not only augments the robustness of security frameworks, but also paves the way for novel strategies that adapt to the evolving challenges of the digital age. This paper discusses the security layers and related services that will be developed, modeled, and evaluated within the Horizon Europe NEUROPULS project. These layers will exploit novel implementations for security primitives based on physical unclonable functions (PUFs) using integrated photonics technology. Their objective is to provide a series of services to support the secure operation of a neuromorphic photonic accelerator for edge computing applications.Comment: 6 pages, 4 figure

    Lorentzian Operator for Angular Source Localization with Large Array, Journal of Telecommunications and Information Technology, 2015, nr 4

    Get PDF
    Source localization problem consists of an ensemble of techniques that are used to obtain spatial information of present radiation in given medium of propagation, with a constraint of the antenna geometry and the characteristics of radiating sources. This condition gives multitude of cases to study, hence several methods were proposed in the literature. In this paper, a new algorithm for estimating the Direction of Arrival (DoA) of narrowband and far field punctual sources is introduced. By exploiting the spectrum of covariance matrix of received data, the Lorentzian function on spectral matrix to filter the eigenvalues is applied. This filtering process eliminates the eigenvalues belonging to signal subspace. Parameters of Lorentz function are adjusted using first and second statistics of eigenvalues. The algorithm requires the knowledge of minimum eigenvalue and is performing when the dimension of antenna is relatively large which is confirmed by several Monte Carlo simulations

    SmartHerd Management: A Microservices Based Fog Computing Assisted IoT Platform towards Data Driven Smart Dairy Farming

    Get PDF
    Internet of things (IoT), fog computing, cloud computing and data driven techniques together offer a great opportunity for verticals such as dairy industry to increase productivity by getting actionable insights to improve farming practices, thereby increasing efficiency and yield. In this paper, we present SmartHerd, a fog computing assisted end-to-end IoT platform for animal behaviour analysis and health monitoring in a dairy farming scenario. The platform follows a microservices oriented design to assist the distributed computing paradigm, and addresses the major issue of constrained Internet connectivity in remote farm locations. We present the implementation of the designed software system in a 6 month mature real-world deployment, wherein the data from wearables on cows is sent to a fog based platform for data classification and analysis, which includes decision making capabilities and provides actionable insights to farmer towards the welfare of animals. With fog based computational assistance in the SmartHerd setup, we see an 84\% reduction in amount of data transferred to the cloud as compared to the conventional cloud based approach

    Network-based IP flow mobility support in 3GPPs evolved packet core

    Get PDF
    Includes bibliographical references.Mobile data traffic in cellular networks has increased tremendously in the last few years. Due to the costs associated with licensed spectrum, Mobile Network Operators (MNOs) are battling to manage these increased traffic growths. Offloading mobile data traffic to alternative low cost access networks like Wi-Fi has been proposed as a candidate solution to enable MNOs to alleviate congestion from the cellular networks. This dissertation investigates an offloading technique called IP flow mobility within the 3rd Generation Partnership Project (3GPP) all-IP mobile core network, the Evolved Packet Core (EPC). IP flow mobility would enable offloading a subset of the mobile user‟s traffic to an alternative access network while allowing the rest of the end-user‟s traffic to be kept in the cellular access; this way, traffic with stringent quality of service requirements like Voice over Internet Protocol (VoIP) would not experience service disruption or interruption when offloaded. This technique is different from previous offloading techniques where all the end-user‟s traffic is offloaded. IP flow mobility functionality can be realised with either host- or network-based mobility protocols. The recommended IP flow mobility standard of 3GPP is based on the host-based mobility solution, Dual-Stack Mobile IPv6. However, host-based mobility solutions have drawbacks like long handover latencies and produce signaling overhead in the radio access networks, which could be less appealing to MNOs. Network-based mobility solutions, compared to the host-based mobility solutions, have reduced handover latencies with no signaling overhead occurring in the radio access network. Proxy Mobile IPv6 is a networkbased mobility protocol adapted by 3GPP for mobility in the EPC. However, the standardisation of the Proxy Mobile IPv6-based IP flow mobility functionality is still ongoing within 3GPP. A review of related literature and standardisation efforts reveals shortcomings with the Proxy Mobile IPv6 mobility protocol in supporting IP flow mobility. Proxy Mobile IPv6 does not have a mechanism that would ensure session continuity during IP flow handoffs or a mechanism enabling controlling of the forwarding path of a particular IP flow i.e., specifying the access network for the IP flow. The latter mechanism is referred to as IP flow information management and flow-based routing. These mechanisms represent the basis for enabling the IP flow mobility functionality. To address the shortcomings of Proxy Mobile IPv6, this dissertation proposes vi enhancements to the protocol procedures to enable the two mechanisms for IP flow mobility functionality. The proposed enhancements for the session continuity mechanism draw on work in related literature and the proposed enhancements for the IP flow information management and flow-based routing mechanism are based on the concepts used in the Dual- Stack Mobile IPv6 IP flow mobility functionality. Together the two mechanisms allow the end-user to issue requests on what access network a particular IP flow should be routed, and ensure that the IP flows are moved to the particular access network without session discontinuity

    Forwarding on Gates: A flexible and scalable inter-network layer supporting in-network functions

    Get PDF
    How to design an inter-network that is flexible regarding its features and scalable at the same time? How can such an inter-network satisfy requirements from applications and subnetworks dynamically? Can routing be more flexible and balance the wishes from end user and network operators? Is there a better world beyond current IP-networks? This book answers these questions by presenting a new architecture called "Forwarding on Gates" (FoG). It exploits the advantages of a recursive reference model and does not follow the traditional OSI reference model. FoG mixes connection-oriented and connectionless aspects dynamically in order to increase its efficiency. It enables a scalable function provisioning by a flexible distribution of states between network participants. Its routing can adjust itself to an optimal trade-off between CPU and memory usage. Moreover, FoG supports new business cases and opens up a market for network-related functions, at which function provider can offer their functions to function users.Auch im Buchhandel erhältlich: Forwarding on Gates : a flexible and scalable inter-network layer supporting in-network functions / Florian Liers Ilmenau : Univ.-Verl. Ilmenau, 2014. - XII, 258 S. ISBN 978-3-86360-094-5 URN urn:nbn:de:gbv:ilm1-2013000657 Preis (Druckausgabe): 30,80

    JTIT

    Get PDF
    kwartalni

    Self-evaluating reinforcement learning based spectrum management for cognitive Ad Hoc networks

    No full text
    Demirci, Cihan (Dogus Author) -- Conference full title: 27th International Conference on Information Networking, ICOIN 2013; Bangkok; Thailand; 27 January 2013 through 30 January 2013Cognitive radio (CR) is an emerging technology which aims to solve the current wireless spectra problems in terms of efficiency and utilization. CRs should respond adequately to environmental changes in order to operate in a highly efficient manner. Reinforcement learning (RL) is an effective method that entails exploration, followed by exploitation and is used to train CRs to function in unknown environments. However, it also suffers from cases that cannot be easily avoided and recovered from, such as: conservative behavior causing converging to a non-ideal state and aggressive exploration that results in disrupting the network. In this paper, we propose a self-evaluating, RL-based spectrum management approach for cognitive ad-hoc networks. We investigate a means to detect environmental changes by having a CR inspect its information consistency and respond accordingly to changes in the environment. We also aim to grant CRs more flexibility in exploration behavior since using this approach will make it easier to remedy any shortcomings caused by aggressive exploration. The benefit of applying our algorithm is demonstrated and comparisons of performances using evaluations of different scopes are also provided to illustrate their impact on the spectrum management. Simulation results show the proposed approach is effective and able to improve the performance by increasing CRs' responsiveness to environmental changes and allowing fast recovery
    corecore