27,411 research outputs found

    Distributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised Network

    Full text link
    We introduce a simple, practical approach with probabilistic information-theoretic security to mitigate one of quantum key distribution's major limitations: the short maximum transmission distance (~200 km) possible with present day technology. Our scheme uses classical secret sharing techniques to allow secure transmission over long distances through a network containing randomly-distributed compromised nodes. The protocol provides arbitrarily high confidence in the security of the protocol, with modest scaling of resource costs with improvement of the security parameter. Although some types of failure are undetectable, users can take preemptive measures to make the probability of such failures arbitrarily small.Comment: 12 pages, 2 figures; added proof of verification sub-protocol, minor correction

    Algorithms for Constructing Overlay Networks For Live Streaming

    Full text link
    We present a polynomial time approximation algorithm for constructing an overlay multicast network for streaming live media events over the Internet. The class of overlay networks constructed by our algorithm include networks used by Akamai Technologies to deliver live media events to a global audience with high fidelity. We construct networks consisting of three stages of nodes. The nodes in the first stage are the entry points that act as sources for the live streams. Each source forwards each of its streams to one or more nodes in the second stage that are called reflectors. A reflector can split an incoming stream into multiple identical outgoing streams, which are then sent on to nodes in the third and final stage that act as sinks and are located in edge networks near end-users. As the packets in a stream travel from one stage to the next, some of them may be lost. A sink combines the packets from multiple instances of the same stream (by reordering packets and discarding duplicates) to form a single instance of the stream with minimal loss. Our primary contribution is an algorithm that constructs an overlay network that provably satisfies capacity and reliability constraints to within a constant factor of optimal, and minimizes cost to within a logarithmic factor of optimal. Further in the common case where only the transmission costs are minimized, we show that our algorithm produces a solution that has cost within a factor of 2 of optimal. We also implement our algorithm and evaluate it on realistic traces derived from Akamai's live streaming network. Our empirical results show that our algorithm can be used to efficiently construct large-scale overlay networks in practice with near-optimal cost

    A critical analysis of research potential, challenges and future directives in industrial wireless sensor networks

    Get PDF
    In recent years, Industrial Wireless Sensor Networks (IWSNs) have emerged as an important research theme with applications spanning a wide range of industries including automation, monitoring, process control, feedback systems and automotive. Wide scope of IWSNs applications ranging from small production units, large oil and gas industries to nuclear fission control, enables a fast-paced research in this field. Though IWSNs offer advantages of low cost, flexibility, scalability, self-healing, easy deployment and reformation, yet they pose certain limitations on available potential and introduce challenges on multiple fronts due to their susceptibility to highly complex and uncertain industrial environments. In this paper a detailed discussion on design objectives, challenges and solutions, for IWSNs, are presented. A careful evaluation of industrial systems, deadlines and possible hazards in industrial atmosphere are discussed. The paper also presents a thorough review of the existing standards and industrial protocols and gives a critical evaluation of potential of these standards and protocols along with a detailed discussion on available hardware platforms, specific industrial energy harvesting techniques and their capabilities. The paper lists main service providers for IWSNs solutions and gives insight of future trends and research gaps in the field of IWSNs

    The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities

    Full text link
    Wireless networks are vulnerable to Sybil attacks, in which a malicious node poses as many identities in order to gain disproportionate influence. Many defenses based on spatial variability of wireless channels exist, but depend either on detailed, multi-tap channel estimation - something not exposed on commodity 802.11 devices - or valid RSSI observations from multiple trusted sources, e.g., corporate access points - something not directly available in ad hoc and delay-tolerant networks with potentially malicious neighbors. We extend these techniques to be practical for wireless ad hoc networks of commodity 802.11 devices. Specifically, we propose two efficient methods for separating the valid RSSI observations of behaving nodes from those falsified by malicious participants. Further, we note that prior signalprint methods are easily defeated by mobile attackers and develop an appropriate challenge-response defense. Finally, we present the Mason test, the first implementation of these techniques for ad hoc and delay-tolerant networks of commodity 802.11 devices. We illustrate its performance in several real-world scenarios

    6G White Paper on Machine Learning in Wireless Communication Networks

    Full text link
    The focus of this white paper is on machine learning (ML) in wireless communications. 6G wireless communication networks will be the backbone of the digital transformation of societies by providing ubiquitous, reliable, and near-instant wireless connectivity for humans and machines. Recent advances in ML research has led enable a wide range of novel technologies such as self-driving vehicles and voice assistants. Such innovation is possible as a result of the availability of advanced ML models, large datasets, and high computational power. On the other hand, the ever-increasing demand for connectivity will require a lot of innovation in 6G wireless networks, and ML tools will play a major role in solving problems in the wireless domain. In this paper, we provide an overview of the vision of how ML will impact the wireless communication systems. We first give an overview of the ML methods that have the highest potential to be used in wireless networks. Then, we discuss the problems that can be solved by using ML in various layers of the network such as the physical layer, medium access layer, and application layer. Zero-touch optimization of wireless networks using ML is another interesting aspect that is discussed in this paper. Finally, at the end of each section, important research questions that the section aims to answer are presented

    Managing the radio spectrum : framework for reform in developing countries

    Get PDF
    Bringing management of the radio spectrum closer to markets is long overdue. The radio spectrum is a major component of the infrastructure that underpins the information society. Spectrum management, however, has not kept up with major changes in technology, business practice, and economic policy that have taken place worldwide during the last two decades. For many years traditional government administration of the spectrum worked reasonably well, but more recently it has led to growing technical and economic inefficiencies as well as obstacles to technological innovation. Two alternative approaches to spectrum management are being tried in several countries, one driven by the market (tradable spectrum rights) and another driven by technology innovation (spectrum commons). This paper discusses the basic features, advantages and limitations, scope of application, and requirements for implementation of these three approaches. The paper then discusses how these approaches can be made to work under conditions that typically prevail in developing countries, including weak rule of law, limited markets, and constrained fiscal space. Although spectrum reform strategies for individual countries must be developed case by case, several broadly applicable strategic options are outlined. The paper proposes a phased approach to addressing spectrum reform in a country. It ends by discussing aspects of institutional design, managing the transition, and addressing high-level changes such as the transition to digital television, the path to third-generation mobile services, launching of wireless fixed broadband services, and releasing military spectrum. The paper is extensively annotated and referenced.E-Business,Roads&Highways,Telecommunications Infrastructure,Climate Change,ICT Policy and Strategies

    Energy and bursty packet loss tradeoff over fading channels: a system-level model

    Get PDF
    Energy efficiency and quality of service (QoS) guarantees are the key design goals for the 5G wireless communication systems. In this context, we discuss a multiuser scheduling scheme over fading channels for loss tolerant applications. The loss tolerance of the application is characterized in terms of different parameters that contribute to quality of experience (QoE) for the application. The mobile users are scheduled opportunistically such that a minimum QoS is guaranteed. We propose an opportunistic scheduling scheme and address the cross-layer design framework when channel state information (CSI) is not perfectly available at the transmitter and the receiver. We characterize the system energy as a function of different QoS and channel state estimation error parameters. The optimization problem is formulated using Markov chain framework and solved using stochastic optimization techniques. The results demonstrate that the parameters characterizing the packet loss are tightly coupled and relaxation of one parameter does not benefit the system much if the other constraints are tight. We evaluate the energy-performance tradeoff numerically and show the effect of channel uncertainty on the packet scheduler design

    Microgrids & District Energy: Pathways To Sustainable Urban Development

    Get PDF
    A microgrid is an energy system specifically designed to meet some of the energy needs of a group of buildings, a campus, or an entire community. It can include local facilities that generate electricity, heating, and/or cooling; store energy; distribute the energy generated; and manage energy consumption intelligently and in real time. Microgrids enable economies of scale that facilitate local production of energy in ways that can advance cost reduction, sustainability, economic development, and resilience goals. As they often involve multiple stakeholders, and may encompass numerous distinct property boundaries, municipal involvement is often a key factor for successful implementation. This report provides an introduction to microgrid concepts, identifies the benefits and most common road blocks to implementation, and discusses proactive steps municipalities can take to advance economically viable and environmentally superior microgrids. It also offers advocacy suggestions for municipal leaders and officials to pursue at the state and regional level. The contents are targeted to municipal government staff but anyone looking for introductory material on microgrids should find it useful

    Property rights, collective Action, and poverty: The role of institutions for poverty reduction

    Get PDF
    "This paper presents a conceptual framework on how institutions of property rights and collective action can contribute to poverty reduction, including through external interventions and action by poor people themselves. The first part of the paper examines the initial conditions of poverty, highlighting the role of assets, risks and vulnerability, legal structures and power relations. The latter part investigates the decision-making dynamics of actors—both poor and non-poor—and how they can use the tangible and intangible resources they have to shape their livelihoods and the institutions that govern their lives. The paper concludes with a discussion of how attention to property rights and collective action can improve the understanding of outcomes in terms of changes in wellbeing." authors' abstractCollective action, Property rights, Poverty reduction, Conceptual framework, Vulnerability, Power, Institutions, Wellbeing,
    • 

    corecore