11 research outputs found

    Heterogeneous LTE/ Wi-Fi architecture for intelligent transportation systems

    Get PDF
    Intelligent Transportation Systems (ITS) make use of advanced technologies to enhance road safety and improve traffic efficiency. It is anticipated that ITS will play a vital future role in improving traffic efficiency, safety, comfort and emissions. In order to assist the passengers to travel safely, efficiently and conveniently, several application requirements have to be met simultaneously. In addition to the delivery of regular traffic and safety information, vehicular networks have been recently required to support infotainment services. Previous vehicular network designs and architectures do not satisfy this increasing traffic demand as they are setup for either voice or data traffic, which is not suitable for the transfer of vehicular traffic. This new requirement is one of the key drivers behind the need for new mobile wireless broadband architectures and technologies. For this purpose, this thesis proposes and investigates a heterogeneous IEEE 802.11 and LTE vehicular system that supports both infotainment and ITS traffic control data. IEEE 802.11g is used for V2V communications and as an on-board access network while, LTE is used for V2I communications. A performance simulation-based study is conducted to validate the feasibility of the proposed system in an urban vehicular environment. The system performance is evaluated in terms of data loss, data rate, delay and jitter. Several simulation scenarios are performed and evaluated. In the V2I-only scenario, the delay, jitter and data drops for both ITS and video traffic are within the acceptable limits, as defined by vehicular application requirements. Although a tendency of increase in video packet drops during handover from one eNodeB to another is observed yet, the attainable data loss rate is still below the defined benchmarks. In the integrated V2V-V2I scenario, data loss in uplink ITS traffic was initially observed so, Burst communication technique is applied to prevent packet losses in the critical uplink ITS traffic. A quantitative analysis is performed to determine the number of packets per burst, the inter-packet and inter-burst intervals. It is found that a substantial improvement is achieved using a two-packet Burst, where no packets are lost in the uplink direction. The delay, jitter and data drops for both uplink and downlink ITS traffic, and video traffic are below the benchmarks of vehicular applications. Thus, the results indicate that the proposed heterogeneous system offers acceptable performance that meets the requirements of the different vehicular applications. All simulations are conducted on OPNET Network Modeler and results are subjected to a 95% confidence analysis

    Security analysis of a WLAN network sample in Tunja, Boyacá, Colombia

    Get PDF
    This paper presents results of a safety analysis of WLAN networks in the city of Tunja, Boyacá Colombia, it is based on a random sample distributed in all over the City. The study is a research result of the project "diagnosis of technology security, applied to a sample of organizations in the city of Tunja". It was funded by the University of Santo Tomas Sectional Tunja. The information collected and analyzed was obtained through the techniques warchalking and Wardriving, in a meaningful representation of wireless networks from public, private, educational institutions and households located geographically in different parts of the city. As a result of the research it was demonstrated different risk levels regarding certain technology configurations of devices of the public, private and residential sectors, finally some conclusions and recommendations were made to enhance the level of security through good practice to configurational level and use of these networks

    Survey and taxonomy of clustering algorithms in 5G

    Get PDF
    The large-scale deployment of fifth generation (5G) is expected to produce a massive amount of data with high variability due to ultra-densification and the rapid increase in a heterogeneous range of applications and services (e.g., virtual reality, augmented reality, and driver-less vehicles), and network devices (e.g., smart gadgets and sensors). Clustering organizes network topology by segregating nodes with similar interests or behaviors in a network into logical groups in order to achieve network-level and cluster-level enhancements, particularly cluster stability, load balancing, social awareness, fairness, and quality of service. Clustering has been investigated to support mobile user equipment (UE) in access networks, whereby UEs form clusters themselves and may connect to BSs. In this paper, we present a comprehensive survey of the research work of clustering schemes proposed for various scenarios in 5G networks and highlight various aspects of clustering schemes, including objectives, challenges, metrics, characteristics, performance measures. Furthermore, we present open issues of clustering in 5G

    Network Challenges of Novel Sources of Big Data

    Get PDF
    Networks and networking technologies are the key components of Big Data systems. Modern and future wireless sensor networks (WSN) act as one of the major sources of data for Big Data systems. Wireless networking technologies allow to offload the traffic generated by WSNs to the Internet access points for further delivery to the cloud storage systems. In this thesis we concentrate on the detailed analysis of the following two networking aspects of future Big Data systems: (i) efficient data collection algorithms in WSNs and (ii) wireless data delivery to the Internet access points.The performance evaluation and optimization models developed in the thesis are based on the application of probability theory, theory of stochastic processes, Markov chain theory, stochastic and integral geometries and the queuing theory.The introductory part discusses major components of Big Data systems, identify networking aspects as the subject of interest and formulates the tasks for the thesis. Further, different challenges of Big Data systems are presented in detail with several competitive architectures highlighted. After that, we proceed investigating data collection approaches in modern and future WSNs. We back up the possibility of using the proposed techniques by providing the associated performance evaluation results. We also pay attention to the process of collected data delivery to the Internet backbone access point, and demonstrate that the capacity of conventional cellular systems may not be sufficient for a set of WSN applications including both video monitoring at macro-scale and sensor data delivery from the nano/micro scales. Seeking for a wireless technology for data offloading from WSNs, we study millimeter and terahertz bands. We show there that the interference structure and signal propagation are fundamentally different due to the required use of highly directional antennas, human blocking and molecular absorption. Finally, to characterize the process of collected data transmission from a number of WSNs over the millimeter wave or terahertz backhauls we formulate and solve a queuing system with multiple auto correlated inputs and the service distribution corresponding to the transmission time over a wireless channel with hybrid automatic repeat request mechanism taken into account

    DESIGN AND OPTIMIZATION OF SIMULTANEOUS WIRELESS INFORMATION AND POWER TRANSFER SYSTEMS

    Get PDF
    The recent trends in the domain of wireless communications indicate severe upcoming challenges, both in terms of infrastructure as well as design of novel techniques. On the other hand, the world population keeps witnessing or hearing about new generations of mobile/wireless technologies within every half to one decade. It is certain the wireless communication systems have enabled the exchange of information without any physical cable(s), however, the dependence of the mobile devices on the power cables still persist. Each passing year unveils several critical challenges related to the increasing capacity and performance needs, power optimization at complex hardware circuitries, mobility of the users, and demand for even better energy efficiency algorithms at the wireless devices. Moreover, an additional issue is raised in the form of continuous battery drainage at these limited-power devices for sufficing their assertive demands. In this regard, optimal performance at any device is heavily constrained by either wired, or an inductive based wireless recharging of the equipment on a continuous basis. This process is very inconvenient and such a problem is foreseen to persist in future, irrespective of the wireless communication method used. Recently, a promising idea for simultaneous wireless radio-frequency (RF) transmission of information and energy came into spotlight during the last decade. This technique does not only guarantee a more flexible recharging alternative, but also ensures its co-existence with any of the existing (RF-based) or alternatively proposed methods of wireless communications, such as visible light communications (VLC) (e.g., Light Fidelity (Li-Fi)), optical communications (e.g., LASER-equipped communication systems), and far-envisioned quantum-based communication systems. In addition, this scheme is expected to cater to the needs of many current and future technologies like wearable devices, sensors used in hazardous areas, 5G and beyond, etc. This Thesis presents a detailed investigation of several interesting scenarios in this direction, specifically concerning design and optimization of such RF-based power transfer systems. The first chapter of this Thesis provides a detailed overview of the considered topic, which serves as the foundation step. The details include the highlights about its main contributions, discussion about the adopted mathematical (optimization) tools, and further refined minutiae about its organization. Following this, a detailed survey on the wireless power transmission (WPT) techniques is provided, which includes the discussion about historical developments of WPT comprising its present forms, consideration of WPT with wireless communications, and its compatibility with the existing techniques. Moreover, a review on various types of RF energy harvesting (EH) modules is incorporated, along with a brief and general overview on the system modeling, the modeling assumptions, and recent industrial considerations. Furthermore, this Thesis work has been divided into three main research topics, as follows. Firstly, the notion of simultaneous wireless information and power transmission (SWIPT) is investigated in conjunction with the cooperative systems framework consisting of single source, multiple relays and multiple users. In this context, several interesting aspects like relay selection, multi-carrier, and resource allocation are considered, along with problem formulations dealing with either maximization of throughput, maximization of harvested energy, or both. Secondly, this Thesis builds up on the idea of transmit precoder design for wireless multigroup multicasting systems in conjunction with SWIPT. Herein, the advantages of adopting separate multicasting and energy precoder designs are illustrated, where we investigate the benefits of multiple antenna transmitters by exploiting the similarities between broadcasting information and wirelessly transferring power. The proposed design does not only facilitates the SWIPT mechanism, but may also serve as a potential candidate to complement the separate waveform designing mechanism with exclusive RF signals meant for information and power transmissions, respectively. Lastly, a novel mechanism is developed to establish a relationship between the SWIPT and cache-enabled cooperative systems. In this direction, benefits of adopting the SWIPT-caching framework are illustrated, with special emphasis on an enhanced rate-energy (R-E) trade-off in contrast to the traditional SWIPT systems. The common notion in the context of SWIPT revolves around the transmission of information, and storage of power. In this vein, the proposed work investigates the system wherein both information and power can be transmitted and stored. The Thesis finally concludes with insights on the future directions and open research challenges associated with the considered framework

    Radio Communications

    Get PDF
    In the last decades the restless evolution of information and communication technologies (ICT) brought to a deep transformation of our habits. The growth of the Internet and the advances in hardware and software implementations modified our way to communicate and to share information. In this book, an overview of the major issues faced today by researchers in the field of radio communications is given through 35 high quality chapters written by specialists working in universities and research centers all over the world. Various aspects will be deeply discussed: channel modeling, beamforming, multiple antennas, cooperative networks, opportunistic scheduling, advanced admission control, handover management, systems performance assessment, routing issues in mobility conditions, localization, web security. Advanced techniques for the radio resource management will be discussed both in single and multiple radio technologies; either in infrastructure, mesh or ad hoc networks

    Demystifying Internet of Things Security

    Get PDF
    Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms

    Enabling technologies and cyber-physical systems for mission-critical scenarios

    Get PDF
    Programa Oficial de Doutoramento en Tecnoloxías da Información e Comunicacións en Redes Móbiles . 5029P01[Abstract] Reliable transport systems, defense, public safety and quality assurance in the Industry 4.0 are essential in a modern society. In a mission-critical scenario, a mission failure would jeopardize human lives and put at risk some other assets whose impairment or loss would significantly harm society or business results. Even small degradations of the communications supporting the mission could have large and possibly dire consequences. On the one hand, mission-critical organizations wish to utilize the most modern, disruptive and innovative communication systems and technologies, and yet, on the other hand, need to comply with strict requirements, which are very different to those of non critical scenarios. The aim of this thesis is to assess the feasibility of applying emerging technologies like Internet of Things (IoT), Cyber-Physical Systems (CPS) and 4G broadband communications in mission-critical scenarios along three key critical infrastructure sectors: transportation, defense and public safety, and shipbuilding. Regarding the transport sector, this thesis provides an understanding of the progress of communications technologies used for railways since the implantation of Global System for Mobile communications-Railways (GSM-R). The aim of this work is to envision the potential contribution of Long Term Evolution (LTE) to provide additional features that GSM-R would never support. Furthermore, the ability of Industrial IoT for revolutionizing the railway industry and confront today's challenges is presented. Moreover, a detailed review of the most common flaws found in Radio Frequency IDentification (RFID) based IoT systems is presented, including the latest attacks described in the literature. As a result, a novel methodology for auditing security and reverse engineering RFID communications in transport applications is introduced. The second sector selected is driven by new operational needs and the challenges that arise from modern military deployments. The strategic advantages of 4G broadband technologies massively deployed in civil scenarios are examined. Furthermore, this thesis analyzes the great potential for applying IoT technologies to revolutionize modern warfare and provide benefits similar to those in industry. It identifies scenarios where defense and public safety could leverage better commercial IoT capabilities to deliver greater survivability to the warfighter or first responders, while reducing costs and increasing operation efficiency and effectiveness. The last part is devoted to the shipbuilding industry. After defining the novel concept of Shipyard 4.0, how a shipyard pipe workshop works and what are the requirements for building a smart pipe system are described in detail. Furthermore, the foundations for enabling an affordable CPS for Shipyards 4.0 are presented. The CPS proposed consists of a network of beacons that continuously collect information about the location of the pipes. Its design allows shipyards to obtain more information on the pipes and to make better use of it. Moreover, it is indicated how to build a positioning system from scratch in an environment as harsh in terms of communications as a shipyard, showing an example of its architecture and implementation.[Resumen] En la sociedad moderna, los sistemas de transporte fiables, la defensa, la seguridad pública y el control de la calidad en la Industria 4.0 son esenciales. En un escenario de misión crítica, el fracaso de una misión pone en peligro vidas humanas y en riesgo otros activos cuyo deterioro o pérdida perjudicaría significativamente a la sociedad o a los resultados de una empresa. Incluso pequeñas degradaciones en las comunicaciones que apoyan la misión podrían tener importantes y posiblemente terribles consecuencias. Por un lado, las organizaciones de misión crítica desean utilizar los sistemas y tecnologías de comunicación más modernos, disruptivos e innovadores y, sin embargo, deben cumplir requisitos estrictos que son muy diferentes a los relativos a escenarios no críticos. El objetivo principal de esta tesis es evaluar la viabilidad de aplicar tecnologías emergentes como Internet of Things (IoT), Cyber-Physical Systems (CPS) y comunicaciones de banda ancha 4G en escenarios de misión crítica en tres sectores clave de infraestructura crítica: transporte, defensa y seguridad pública, y construcción naval. Respecto al sector del transporte, esta tesis permite comprender el progreso de las tecnologías de comunicación en el ámbito ferroviario desde la implantación de Global System for Mobile communications-Railway (GSM-R). El objetivo de este trabajo es analizar la contribución potencial de Long Term Evolution (LTE) para proporcionar características adicionales que GSM-R nunca podría soportar. Además, se presenta la capacidad de la IoT industrial para revolucionar la industria ferroviaria y afrontar los retos actuales. Asimismo, se estudian con detalle las vulnerabilidades más comunes de los sistemas IoT basados en Radio Frequency IDentification (RFID), incluyendo los últimos ataques descritos en la literatura. Como resultado, se presenta una metodología innovadora para realizar auditorías de seguridad e ingeniería inversa de las comunicaciones RFID en aplicaciones de transporte. El segundo sector elegido viene impulsado por las nuevas necesidades operacionales y los desafíos que surgen de los despliegues militares modernos. Para afrontarlos, se analizan las ventajas estratégicas de las tecnologías de banda ancha 4G masivamente desplegadas en escenarios civiles. Asimismo, esta tesis analiza el gran potencial de aplicación de las tecnologías IoT para revolucionar la guerra moderna y proporcionar beneficios similares a los alcanzados por la industria. Se identifican escenarios en los que la defensa y la seguridad pública podrían aprovechar mejor las capacidades comerciales de IoT para ofrecer una mayor capacidad de supervivencia al combatiente o a los servicios de emergencias, a la vez que reduce los costes y aumenta la eficiencia y efectividad de las operaciones. La última parte se dedica a la industria de construcción naval. Después de definir el novedoso concepto de Astillero 4.0, se describe en detalle cómo funciona el taller de tubería de astillero y cuáles son los requisitos para construir un sistema de tuberías inteligentes. Además, se presentan los fundamentos para posibilitar un CPS asequible para Astilleros 4.0. El CPS propuesto consiste en una red de balizas que continuamente recogen información sobre la ubicación de las tuberías. Su diseño permite a los astilleros obtener más información sobre las tuberías y hacer un mejor uso de las mismas. Asimismo, se indica cómo construir un sistema de posicionamiento desde cero en un entorno tan hostil en términos de comunicaciones, mostrando un ejemplo de su arquitectura e implementación

    Optimization of Mobility Parameters using Fuzzy Logic and Reinforcement Learning in Self-Organizing Networks

    Get PDF
    In this thesis, several optimization techniques for next-generation wireless networks are proposed to solve different problems in the field of Self-Organizing Networks and heterogeneous networks. The common basis of these problems is that network parameters are automatically tuned to deal with the specific problem. As the set of network parameters is extremely large, this work mainly focuses on parameters involved in mobility management. In addition, the proposed self-tuning schemes are based on Fuzzy Logic Controllers (FLC), whose potential lies in the capability to express the knowledge in a similar way to the human perception and reasoning. In addition, in those cases in which a mathematical approach has been required to optimize the behavior of the FLC, the selected solution has been Reinforcement Learning, since this methodology is especially appropriate for learning from interaction, which becomes essential in complex systems such as wireless networks. Taking this into account, firstly, a new Mobility Load Balancing (MLB) scheme is proposed to solve persistent congestion problems in next-generation wireless networks, in particular, due to an uneven spatial traffic distribution, which typically leads to an inefficient usage of resources. A key feature of the proposed algorithm is that not only the parameters are optimized, but also the parameter tuning strategy. Secondly, a novel MLB algorithm for enterprise femtocells scenarios is proposed. Such scenarios are characterized by the lack of a thorough deployment of these low-cost nodes, meaning that a more efficient use of radio resources can be achieved by applying effective MLB schemes. As in the previous problem, the optimization of the self-tuning process is also studied in this case. Thirdly, a new self-tuning algorithm for Mobility Robustness Optimization (MRO) is proposed. This study includes the impact of context factors such as the system load and user speed, as well as a proposal for coordination between the designed MLB and MRO functions. Fourthly, a novel self-tuning algorithm for Traffic Steering (TS) in heterogeneous networks is proposed. The main features of the proposed algorithm are the flexibility to support different operator policies and the adaptation capability to network variations. Finally, with the aim of validating the proposed techniques, a dynamic system-level simulator for Long-Term Evolution (LTE) networks has been designed

    Network sharing through service outsourcing in inter-domain IMS frameworks

    Get PDF
    Includes abstract.Includes bibliographical references (leaves 161-167).Resource sharing can be used as a short-term solution to the imbalance between the supply and demand of network resources. Resources sharing enables operators to provide services to their subscribers using networks belonging to other operators. Resource sharing in mobile networks is increasingly becoming an option for operators to provide service to their subscribers. In this thesis we explore a mechanism for sharing access network resources that utilises negotiable short-term Service Level Agreements (SLA) that can easily adapt to changing network conditions. Through this mechanism operators of resource constrained networks may use near real time dynamic SLAs to negotiate network access services for their subscribers. We refer to this form of resource sharing as 'Service Outsourcing'
    corecore