61,783 research outputs found
Mobile integrated conditional access system
This paper presents design of a novel security architecture integrating mobile and broadcasting technologies in the Pay-TV system. The security architecture proposed herein is a state-of-the-art solution to tackle well-known problems challenging current Pay-TV systems including but not limited to interoperability amongst service providers, relatively high cost of the service deployment, the security compromise, limited interactivity and bespoken services offered to subscribers. It also proposes the Follow-me service that enables subscribers to access their entitlements via an arbitrary set-top box
Recommended from our members
Security architectures in mobile integrated pay-TV
This paper presents the design and describes the advantage of the state-of-the-art Mobile Integrated Conditional Access System (MICAS) concerning interoperability, personalisation, security and operational costs in Pay-TV systems. The Message Handling Subsystem is proposed and outlined together with âFollow-Meâ service, which proposed herewith to extend mobility and personalisation concepts on Pay-TV service
A Survey on Wireless Sensor Network Security
Wireless sensor networks (WSNs) have recently attracted a lot of interest in
the research community due their wide range of applications. Due to distributed
nature of these networks and their deployment in remote areas, these networks
are vulnerable to numerous security threats that can adversely affect their
proper functioning. This problem is more critical if the network is deployed
for some mission-critical applications such as in a tactical battlefield.
Random failure of nodes is also very likely in real-life deployment scenarios.
Due to resource constraints in the sensor nodes, traditional security
mechanisms with large overhead of computation and communication are infeasible
in WSNs. Security in sensor networks is, therefore, a particularly challenging
task. This paper discusses the current state of the art in security mechanisms
for WSNs. Various types of attacks are discussed and their countermeasures
presented. A brief discussion on the future direction of research in WSN
security is also included.Comment: 24 pages, 4 figures, 2 table
On Content-centric Wireless Delivery Networks
The flux of social media and the convenience of mobile connectivity has
created a mobile data phenomenon that is expected to overwhelm the mobile
cellular networks in the foreseeable future. Despite the advent of 4G/LTE, the
growth rate of wireless data has far exceeded the capacity increase of the
mobile networks. A fundamentally new design paradigm is required to tackle the
ever-growing wireless data challenge.
In this article, we investigate the problem of massive content delivery over
wireless networks and present a systematic view on content-centric network
design and its underlying challenges. Towards this end, we first review some of
the recent advancements in Information Centric Networking (ICN) which provides
the basis on how media contents can be labeled, distributed, and placed across
the networks. We then formulate the content delivery task into a content rate
maximization problem over a share wireless channel, which, contrasting the
conventional wisdom that attempts to increase the bit-rate of a unicast system,
maximizes the content delivery capability with a fixed amount of wireless
resources. This conceptually simple change enables us to exploit the "content
diversity" and the "network diversity" by leveraging the abundant computation
sources (through application-layer encoding, pushing and caching, etc.) within
the existing wireless networks. A network architecture that enables wireless
network crowdsourcing for content delivery is then described, followed by an
exemplary campus wireless network that encompasses the above concepts.Comment: 20 pages, 7 figures,accepted by IEEE Wireless
Communications,Sept.201
Analysis of DVB-H network coverage with the application of transmit diversity
This paper investigates the effects of the Cyclic Delay Diversity (CDD) transmit diversity scheme on DVB-H networks. Transmit diversity improves reception and Quality of Service (QoS) in areas of poor coverage such as sparsely populated or obscured locations. The technique not only povides robust reception in mobile environments thus improving QoS, but it also reduces network costs in terms of the transmit power, number of
infrastructure elements, antenna height and the frequency reuse factor over indoor and outdoor environments. In this paper, the benefit and effectiveness of CDD transmit diversity is tackled
through simulation results for comparison in several scenarios of coverage in DVB-H networks. The channel model used in the simulations is based on COST207 and a basic radio planning
technique is used to illustrate the main principles developed in this paper. The work reported in this paper was supported by
the European Commission IST projectâPLUTO (Physical Layer DVB Transmission Optimization)
Wireless communication, identification and sensing technologies enabling integrated logistics: a study in the harbor environment
In the last decade, integrated logistics has become an important challenge in
the development of wireless communication, identification and sensing
technology, due to the growing complexity of logistics processes and the
increasing demand for adapting systems to new requirements. The advancement of
wireless technology provides a wide range of options for the maritime container
terminals. Electronic devices employed in container terminals reduce the manual
effort, facilitating timely information flow and enhancing control and quality
of service and decision made. In this paper, we examine the technology that can
be used to support integration in harbor's logistics. In the literature, most
systems have been developed to address specific needs of particular harbors,
but a systematic study is missing. The purpose is to provide an overview to the
reader about which technology of integrated logistics can be implemented and
what remains to be addressed in the future
Data Dissemination Performance in Large-Scale Sensor Networks
As the use of wireless sensor networks increases, the need for
(energy-)efficient and reliable broadcasting algorithms grows. Ideally, a
broadcasting algorithm should have the ability to quickly disseminate data,
while keeping the number of transmissions low. In this paper we develop a model
describing the message count in large-scale wireless sensor networks. We focus
our attention on the popular Trickle algorithm, which has been proposed as a
suitable communication protocol for code maintenance and propagation in
wireless sensor networks. Besides providing a mathematical analysis of the
algorithm, we propose a generalized version of Trickle, with an additional
parameter defining the length of a listen-only period. This generalization
proves to be useful for optimizing the design and usage of the algorithm. For
single-cell networks we show how the message count increases with the size of
the network and how this depends on the Trickle parameters. Furthermore, we
derive distributions of inter-broadcasting times and investigate their
asymptotic behavior. Our results prove conjectures made in the literature
concerning the effect of a listen-only period. Additionally, we develop an
approximation for the expected number of transmissions in multi-cell networks.
All results are validated by simulations
V2X Meets NOMA: Non-Orthogonal Multiple Access for 5G Enabled Vehicular Networks
Benefited from the widely deployed infrastructure, the LTE network has
recently been considered as a promising candidate to support the
vehicle-to-everything (V2X) services. However, with a massive number of devices
accessing the V2X network in the future, the conventional OFDM-based LTE
network faces the congestion issues due to its low efficiency of orthogonal
access, resulting in significant access delay and posing a great challenge
especially to safety-critical applications. The non-orthogonal multiple access
(NOMA) technique has been well recognized as an effective solution for the
future 5G cellular networks to provide broadband communications and massive
connectivity. In this article, we investigate the applicability of NOMA in
supporting cellular V2X services to achieve low latency and high reliability.
Starting with a basic V2X unicast system, a novel NOMA-based scheme is proposed
to tackle the technical hurdles in designing high spectral efficient scheduling
and resource allocation schemes in the ultra dense topology. We then extend it
to a more general V2X broadcasting system. Other NOMA-based extended V2X
applications and some open issues are also discussed.Comment: Accepted by IEEE Wireless Communications Magazin
- âŠ