3,301 research outputs found
DSRC Versus LTE-V2X: Empirical Performance Analysis of Direct Vehicular Communication Technologies
Vehicle-to-Vehicle (V2V) communication systems have an eminence potential to improve road safety and optimize traffic flow by broadcasting Basic Safety Messages (BSMs). Dedicated Short-Range Communication (DSRC) and LTE Vehicle-to-Everything (V2X) are two candidate technologies to enable V2V communication. DSRC relies on the IEEE 802.11p standard for its PHY and MAC layer while LTE-V2X is based on 3GPP’s Release 14 and operates in a distributed manner in the absence of cellular infrastructure. There has been considerable debate over the relative advantages and disadvantages of DSRC and LTE-V2X, aiming to answer the fundamental question of which technology is most effective in real-world scenarios for various road safety and traffic efficiency applications. In this paper, we present a comprehensive survey of these two technologies (i.e., DSRC and LTE-V2X) and related works. More specifically, we study the PHY and MAC layer of both technologies in the survey study and compare the PHY layer performance using a variety of field tests. First, we provide a summary of each technology and highlight the limitations of each in supporting V2X applications. Then, we examine their performance based on different metrics
Deteção de intrusões de rede baseada em anomalias
Dissertação de mestrado integrado em Eletrónica Industrial e ComputadoresAo longo dos últimos anos, a segurança de hardware e software tornou-se uma grande preocupação. À medida
que a complexidade dos sistemas aumenta, as suas vulnerabilidades a sofisticadas técnicas de ataque têm
proporcionalmente escalado. Frequentemente o problema reside na heterogenidade de dispositivos conectados ao
veículo, tornando difícil a convergência da monitorização de todos os protocolos num único produto de segurança.
Por esse motivo, o mercado requer ferramentas mais avançadas para a monitorizar ambientes críticos à vida
humana, tais como os nossos automóveis.
Considerando que existem várias formas de interagir com os sistemas de entretenimento do automóvel como
o Bluetooth, o Wi-fi ou CDs multimédia, a necessidade de auditar as suas interfaces tornou-se uma prioridade,
uma vez que elas representam um sério meio de aceeso à rede interna do carro. Atualmente, os mecanismos de
segurança de um carro focam-se na monitotização da rede CAN, deixando para trás as tecnologias referidas e não
contemplando os sistemas não críticos. Como exemplo disso, o Bluetooth traz desafios diferentes da rede CAN,
uma vez que interage diretamente com o utilizador e está exposto a ataques externos.
Uma abordagem alternativa para tornar o automóvel num sistema mais robusto é manter sob supervisão as
comunicações que com este são estabelecidas. Ao implementar uma detecção de intrusão baseada em anomalias,
esta dissertação visa analisar o protocolo Bluetooth no sentido de identificar interações anormais que possam
alertar para uma situação fora dos padrões de utilização. Em última análise, este produto de software embebido
incorpora uma grande margem de auto-aprendizagem, que é vital para enfrentar quaisquer ameaças desconhecidas
e aumentar os níveis de segurança globais. Ao longo deste documento, apresentamos o estudo do problema seguido
de uma metodologia alternativa que implementa um algoritmo baseado numa LSTM para prever a sequência de
comandos HCI correspondentes a tráfego Bluetooth normal. Os resultados mostram a forma como esta abordagem
pode impactar a deteção de intrusões nestes ambientes ao demonstrar uma grande capacidade para identificar padrões anómalos no conjunto de dados considerado.In the last few years, hardware and software security have become a major concern. As the systems’ complexity
increases, its vulnerabilities to several sophisticated attack techniques have escalated likewise. Quite often, the
problem lies in the heterogeneity of the devices connected to the vehicle, making it difficult to converge the monitoring
systems of all existing protocols into one security product. Thereby, the market requires more refined tools to monitor
life-risky environments such as personal vehicles.
Considering that there are several ways to interact with the car’s infotainment system, such as Wi-fi, Bluetooth,
or CD player, the need to audit these interfaces has become a priority as they represent a serious channel to reach
the internal car network. Nowadays, security in car networks focuses on CAN bus monitoring, leaving behind the
aforementioned technologies and not contemplating other non-critical systems. As an example of these concerns,
Bluetooth brings different challenges compared to CAN as it interacts directly with the user, being exposed to external
attacks.
An alternative approach to converting modern vehicles and their set of computers into more robust systems
is to keep track of established communications with them. By enforcing anomaly-based intrusion detection this
dissertation aims to analyze the Bluetooth protocol to identify abnormal user interactions that may alert for a non conforming pattern. Ultimately, such embedded software product incorporates a self-learning edge, which is vital to
face newly developed threats and increasing global security levels. Throughout this document, we present the study
case followed by an alternative methodology that implements an LSTM based algorithm to predict a sequence of
HCI commands corresponding to normal Bluetooth traffic. The results show how this approach can impact intrusion
detection in such environments by expressing a high capability of identifying abnormal patterns in the considered
data
Beam scanning by liquid-crystal biasing in a modified SIW structure
A fixed-frequency beam-scanning 1D antenna based on Liquid Crystals (LCs) is designed for application in 2D scanning with lateral alignment. The 2D array environment imposes full decoupling of adjacent 1D antennas, which often conflicts with the LC requirement of DC biasing: the proposed design accommodates both. The LC medium is placed inside a Substrate Integrated Waveguide (SIW) modified to work as a Groove Gap Waveguide, with radiating slots etched on the upper broad wall, that radiates as a Leaky-Wave Antenna (LWA). This allows effective application of the DC bias voltage needed for tuning the LCs. At the same time, the RF field remains laterally confined, enabling the possibility to lay several antennas in parallel and achieve 2D beam scanning. The design is validated by simulation employing the actual properties of a commercial LC medium
Adaptive vehicular networking with Deep Learning
Vehicular networks have been identified as a key enabler for future smart traffic applications aiming to improve on-road safety, increase road traffic efficiency, or provide advanced infotainment services to improve on-board comfort. However, the requirements of smart traffic applications also place demands on vehicular networks’ quality in terms of high data rates, low latency, and reliability, while simultaneously meeting the challenges of sustainability, green network development goals and energy efficiency. The advances in vehicular communication technologies combined with the peculiar characteristics of vehicular networks have brought challenges to traditional networking solutions designed around fixed parameters using complex mathematical optimisation. These challenges necessitate greater intelligence to be embedded in vehicular networks to realise adaptive network optimisation. As such, one promising solution is the use of Machine Learning (ML) algorithms to extract hidden patterns from collected data thus formulating adaptive network optimisation solutions with strong generalisation capabilities.
In this thesis, an overview of the underlying technologies, applications, and characteristics of vehicular networks is presented, followed by the motivation of using ML and a general introduction of ML background. Additionally, a literature review of ML applications in vehicular networks is also presented drawing on the state-of-the-art of ML technology adoption. Three key challenging research topics have been identified centred around network optimisation and ML deployment aspects.
The first research question and contribution focus on mobile Handover (HO) optimisation as vehicles pass between base stations; a Deep Reinforcement Learning (DRL) handover algorithm is proposed and evaluated against the currently deployed method. Simulation results suggest that the proposed algorithm can guarantee optimal HO decision in a realistic simulation setup.
The second contribution explores distributed radio resource management optimisation. Two versions of a Federated Learning (FL) enhanced DRL algorithm are proposed and evaluated against other state-of-the-art ML solutions. Simulation results suggest that the proposed solution outperformed other benchmarks in overall resource utilisation efficiency, especially in generalisation scenarios.
The third contribution looks at energy efficiency optimisation on the network side considering a backdrop of sustainability and green networking. A cell switching algorithm was developed based on a Graph Neural Network (GNN) model and the proposed energy efficiency scheme is able to achieve almost 95% of the metric normalised energy efficiency compared against the “ideal” optimal energy efficiency benchmark and is capable of being applied in many more general network configurations compared with the state-of-the-art ML benchmark
QoS-aware architectures, technologies, and middleware for the cloud continuum
The recent trend of moving Cloud Computing capabilities to the Edge of the network is reshaping how applications and their middleware supports are designed, deployed, and operated. This new model envisions a continuum of virtual resources between the traditional cloud and the network edge, which is potentially more suitable to meet the heterogeneous Quality of Service (QoS) requirements of diverse application domains and next-generation applications. Several classes of advanced Internet of Things (IoT) applications, e.g., in the industrial manufacturing domain, are expected to serve a wide range of applications with heterogeneous QoS requirements and call for QoS management systems to guarantee/control performance indicators, even in the presence of real-world factors such as limited bandwidth and concurrent virtual resource utilization. The present dissertation proposes a comprehensive QoS-aware architecture that addresses the challenges of integrating cloud infrastructure with edge nodes in IoT applications. The architecture provides end-to-end QoS support by incorporating several components for managing physical and virtual resources. The proposed architecture features: i) a multilevel middleware for resolving the convergence between Operational Technology (OT) and Information Technology (IT), ii) an end-to-end QoS management approach compliant with the Time-Sensitive Networking (TSN) standard, iii) new approaches for virtualized network environments, such as running TSN-based applications under Ultra-low Latency (ULL) constraints in virtual and 5G environments, and iv) an accelerated and deterministic container overlay network architecture. Additionally, the QoS-aware architecture includes two novel middlewares: i) a middleware that transparently integrates multiple acceleration technologies in heterogeneous Edge contexts and ii) a QoS-aware middleware for Serverless platforms that leverages coordination of various QoS mechanisms and virtualized Function-as-a-Service (FaaS) invocation stack to manage end-to-end QoS metrics. Finally, all architecture components were tested and evaluated by leveraging realistic testbeds, demonstrating the efficacy of the proposed solutions
Analysis and Design of Algorithms for the Improvement of Non-coherent Massive MIMO based on DMPSK for beyond 5G systems
Mención Internacional en el título de doctorNowadays, it is nearly impossible to think of a service that does not rely on wireless communications.
By the end of 2022, mobile internet represented a 60% of the total global online traffic.
There is an increasing trend both in the number of subscribers and in the traffic handled by each
subscriber. Larger data rates, smaller extreme-to-extreme (E2E) delays and greater number of
devices are current interests for the development of mobile communications. Furthermore, it
is foreseen that these demands should also be fulfilled in scenarios with stringent conditions,
such as very fast varying wireless communications channels (either in time or frequency) or
scenarios with power constraints, mainly found when the equipment is battery powered.
Since most of the wireless communications techniques and standards rely on the fact that the
wireless channel is somehow characterized or estimated to be pre or post-compensated in transmission
(TX) or reception (RX), there is a clear problem when the channels vary rapidly or the
available power is constrained. To estimate the wireless channel and obtain the so-called channel
state information (CSI), some of the available resources (either in time, frequency or any
other dimension), are utilized by including known signals in the TX and RX typically known as
pilots, thus avoiding their use for data transmission. If the channels vary rapidly, they must be
estimated many times, which results in a very low data efficiency of the communications link.
Also, in case the power is limited or the wireless link distance is large, the resulting signal-tointerference-
plus-noise ratio (SINR) will be low, which is a parameter that is directly related to
the quality of the channel estimation and the performance of the data reception. This problem
is aggravated in massive multiple-input multiple-output (massive MIMO), which is a promising
technique for future wireless communications since it can increase the data rates, increase the
reliability and cope with a larger number of simultaneous devices. In massive MIMO, the base
station (BS) is typically equipped with a large number of antennas that are coordinated. In these
scenarios, the channels must be estimated for each antenna (or at least for each user), and thus,
the aforementioned problem of channel estimation aggravates. In this context, algorithms and
techniques for massive MIMO without CSI are of interest.
This thesis main topic is non-coherent massive multiple-input multiple-output (NC-mMIMO)
which relies on the use of differential M-ary phase shift keying (DMPSK) and the spatial
diversity of the antenna arrays to be able to detect the useful transmitted data without CSI knowledge. On the one hand, hybrid schemes that combine the coherent and non-coherent
schemes allowing to get the best of both worlds are proposed. These schemes are based on
distributing the resources between non-coherent (NC) and coherent data, utilizing the NC data
to estimate the channel without using pilots and use the estimated channel for the coherent
data. On the other hand, new constellations and user allocation strategies for the multi-user
scenario of NC-mMIMO are proposed. The new constellations are better than the ones in the
literature and obtained using artificial intelligence techniques, more concretely evolutionary
computation.This work has received funding from the European Union Horizon 2020 research and innovation
programme under the Marie Skłodowska-Curie ETN TeamUp5G, grant agreement No.
813391. The PhD student was the Early Stage Researcher (ESR) number 2 of the project.
This work has also received funding from the Spanish National Project IRENE-EARTH
(PID2020-115323RB-C33) (MINECO/AEI/FEDER, UE), which funded the work of some coauthors.Programa de Doctorado en Multimedia y Comunicaciones por la Universidad Carlos III de Madrid y la Universidad Rey Juan CarlosPresidente: Luis Castedo Ribas.- Secretario: Matilde Pilar Sánchez Fernández.- Vocal: Eva Lagunas Targaron
Modern meat: the next generation of meat from cells
Modern Meat is the first textbook on cultivated meat, with contributions from over 100 experts within the cultivated meat community.
The Sections of Modern Meat comprise 5 broad categories of cultivated meat: Context, Impact, Science, Society, and World.
The 19 chapters of Modern Meat, spread across these 5 sections, provide detailed entries on cultivated meat. They extensively tour a range of topics including the impact of cultivated meat on humans and animals, the bioprocess of cultivated meat production, how cultivated meat may become a food option in Space and on Mars, and how cultivated meat may impact the economy, culture, and tradition of Asia
- …