7,195 research outputs found
The Role of the Internet of Things in Network Resilience
Disasters lead to devastating structural damage not only to buildings and
transport infrastructure, but also to other critical infrastructure, such as
the power grid and communication backbones. Following such an event, the
availability of minimal communication services is however crucial to allow
efficient and coordinated disaster response, to enable timely public
information, or to provide individuals in need with a default mechanism to post
emergency messages. The Internet of Things consists in the massive deployment
of heterogeneous devices, most of which battery-powered, and interconnected via
wireless network interfaces. Typical IoT communication architectures enables
such IoT devices to not only connect to the communication backbone (i.e. the
Internet) using an infrastructure-based wireless network paradigm, but also to
communicate with one another autonomously, without the help of any
infrastructure, using a spontaneous wireless network paradigm. In this paper,
we argue that the vast deployment of IoT-enabled devices could bring benefits
in terms of data network resilience in face of disaster. Leveraging their
spontaneous wireless networking capabilities, IoT devices could enable minimal
communication services (e.g. emergency micro-message delivery) while the
conventional communication infrastructure is out of service. We identify the
main challenges that must be addressed in order to realize this potential in
practice. These challenges concern various technical aspects, including
physical connectivity requirements, network protocol stack enhancements, data
traffic prioritization schemes, as well as social and political aspects
Secure Vehicular Communication Systems: Implementation, Performance, and Research Challenges
Vehicular Communication (VC) systems are on the verge of practical
deployment. Nonetheless, their security and privacy protection is one of the
problems that have been addressed only recently. In order to show the
feasibility of secure VC, certain implementations are required. In [1] we
discuss the design of a VC security system that has emerged as a result of the
European SeVeCom project. In this second paper, we discuss various issues
related to the implementation and deployment aspects of secure VC systems.
Moreover, we provide an outlook on open security research issues that will
arise as VC systems develop from today's simple prototypes to full-fledged
systems
Energy efficiency in heterogeneous wireless access networks
In this article, we bring forward the important aspect of energy savings in wireless access networks. We specifically focus on the energy saving opportunities in the recently evolving heterogeneous networks (HetNets), both Single- RAT and Multi-RAT. Issues such as sleep/wakeup cycles and interference management are discussed for co-channel Single-RAT HetNets. In addition to that, a simulation based study for LTE macro-femto HetNets is presented, indicating the need for dynamic energy efficient resource management schemes. Multi-RAT HetNets also come with challenges such as network integration, combined resource management and network selection. Along with a discussion on these challenges, we also investigate the performance of the conventional WLAN-first network selection mechanism in terms of energy efficiency (EE) and suggest that EE can be improved by the application of intelligent call admission control policies
- …