2,269 research outputs found

    Business models for deployment and operation of femtocell networks; - Are new cooperation strategies needed for mobile operators?

    Get PDF
    In this paper we discuss different business models for deployment and operation of femtocell networks intended for provisioning of public mobile broad band access services. In these types of business cases the operators use femtocells in order to reduce investments in "more costly" macro networks since the traffic can be "offloaded" to "less costly" femtocell networks. This is in contrast to the many business cases presented in Femtoforum where femtocells mainly are discussed as a solution to improve indoor coverage for voice services in homes and small offices, usually for closed user groups The main question discussed in this paper is if "operators need to consider new forms of cooperation strategies in order to enable large scale deployment of femtocells for public access?" By looking into existing solutions for indoor wireless access services we claim that the answer is both "Yes" and "No". No, since many types of cooperation are already in place for indoor deployment. Yes, because mobile operators need to re-think the femtocell specific business models, from approaches based on singe operator networks to different forms of cooperation involving multi-operator solutions, e.g. roaming and network sharing. --

    Spectrum sharing security and attacks in CRNs: a review

    Get PDF
    Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundament al approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of the common control channel, more attention is paid to the security of the common control channel by looking into its security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR - specific security mechanisms are presented with some open research issues and challenges

    Software-defined Networking enabled Resource Management and Security Provisioning in 5G Heterogeneous Networks

    Get PDF
    Due to the explosive growth of mobile data traffic and the shortage of spectral resources, 5G networks are envisioned to have a densified heterogeneous network (HetNet) architecture, combining multiple radio access technologies (multi-RATs) into a single holistic network. The co-existing of multi-tier architectures bring new challenges, especially on resource management and security provisioning, due to the lack of common interface and consistent policy across HetNets. In this thesis, we aim to address the technical challenges of data traffic management, coordinated spectrum sharing and security provisioning in 5G HetNets through the introduction of a programmable management platform based on Software-defined networking (SDN). To address the spectrum shortage problem in cellular networks, cellular data traffic is efficiently offloaded to the Wi-Fi network, and the quality of service of user applications is guaranteed with the proposed delay tolerance based partial data offloading algorithm. A two-layered information collection is also applied to best load balancing decision-making. Numerical results show that the proposed schemes exploit an SDN controller\u27s global view of the HetNets and take optimized resource allocation decisions. To support growing vehicle-generated data traffic in 5G-vehicle ad hoc networks (VANET), SDN-enabled adaptive vehicle clustering algorithm is proposed based on the real-time road traffic condition collected from HetNet infrastructure. Traffic offloading is achieved within each cluster and dynamic beamformed transmission is also applied to improve trunk link communication quality. To further achieve a coordinated spectrum sharing across HetNets, an SDN enabled orchestrated spectrum sharing scheme that integrates participating HetNets into an amalgamated network through a common configuration interface and real-time information exchange is proposed. In order to effectively protect incumbent users, a real-time 3D interference map is developed to guide the spectrum access based on the SDN global view. MATLAB simulations confirm that average interference at incumbents is reduced as well as the average number of denied access. Moreover, to tackle the contradiction between more stringent latency requirement of 5G and the potential delay induced by frequent authentications in 5G small cells and HetNets, an SDN-enabled fast authentication scheme is proposed in this thesis to simplify authentication handover, through sharing of user-dependent secure context information (SCI) among related access points. The proposed SCI is a weighted combination of user-specific attributes, which provides unique fingerprint of the specific device without additional hardware and computation cost. Numerical results show that the proposed non-cryptographic authentication scheme achieves comparable security with traditional cryptographic algorithms, while reduces authentication complexity and latency especially when network load is high

    Smart Grid Communications: Overview of Research Challenges, Solutions, and Standardization Activities

    Full text link
    Optimization of energy consumption in future intelligent energy networks (or Smart Grids) will be based on grid-integrated near-real-time communications between various grid elements in generation, transmission, distribution and loads. This paper discusses some of the challenges and opportunities of communications research in the areas of smart grid and smart metering. In particular, we focus on some of the key communications challenges for realizing interoperable and future-proof smart grid/metering networks, smart grid security and privacy, and how some of the existing networking technologies can be applied to energy management. Finally, we also discuss the coordinated standardization efforts in Europe to harmonize communications standards and protocols.Comment: To be published in IEEE Communications Surveys and Tutorial

    Emerging Edge Computing Technologies for Distributed Internet of Things (IoT) Systems

    Get PDF
    The ever-increasing growth in the number of connected smart devices and various Internet of Things (IoT) verticals is leading to a crucial challenge of handling massive amount of raw data generated from distributed IoT systems and providing real-time feedback to the end-users. Although existing cloud-computing paradigm has an enormous amount of virtual computing power and storage capacity, it is not suitable for latency-sensitive applications and distributed systems due to the involved latency and its centralized mode of operation. To this end, edge/fog computing has recently emerged as the next generation of computing systems for extending cloud-computing functions to the edges of the network. Despite several benefits of edge computing such as geo-distribution, mobility support and location awareness, various communication and computing related challenges need to be addressed in realizing edge computing technologies for future IoT systems. In this regard, this paper provides a holistic view on the current issues and effective solutions by classifying the emerging technologies in regard to the joint coordination of radio and computing resources, system optimization and intelligent resource management. Furthermore, an optimization framework for edge-IoT systems is proposed to enhance various performance metrics such as throughput, delay, resource utilization and energy consumption. Finally, a Machine Learning (ML) based case study is presented along with some numerical results to illustrate the significance of edge computing.Comment: 16 pages, 4 figures, 2 tables, submitted to IEEE Wireless Communications Magazin
    • …
    corecore