17,523 research outputs found
CogCell: Cognitive Interplay between 60GHz Picocells and 2.4/5GHz Hotspots in the 5G Era
Rapid proliferation of wireless communication devices and the emergence of a
variety of new applications have triggered investigations into next-generation
mobile broadband systems, i.e., 5G. Legacy 2G--4G systems covering large areas
were envisioned to serve both indoor and outdoor environments. However, in the
5G-era, 80\% of overall traffic is expected to be generated in indoors. Hence,
the current approach of macro-cell mobile network, where there is no
differentiation between indoors and outdoors, needs to be reconsidered. We
envision 60\,GHz mmWave picocell architecture to support high-speed indoor and
hotspot communications. We envisage the 5G indoor network as a combination of-,
and interplay between, 2.4/5\,GHz having robust coverage and 60\,GHz links
offering high datarate. This requires an intelligent coordination and
cooperation. We propose 60\,GHz picocellular network architecture, called
CogCell, leveraging the ubiquitous WiFi. We propose to use 60\,GHz for the data
plane and 2.4/5GHz for the control plane. The hybrid network architecture
considers an opportunistic fall-back to 2.4/5\,GHz in case of poor connectivity
in the 60\,GHz domain. Further, to avoid the frequent re-beamforming in 60\,GHz
directional links due to mobility, we propose a cognitive module -- a
sensor-assisted intelligent beam switching procedure -- which reduces the
communication overhead. We believe that the CogCell concept will help future
indoor communications and possibly outdoor hotspots, where mobile stations and
access points collaborate with each other to improve the user experience.Comment: 14 PAGES in IEEE Communications Magazine, Special issue on Emerging
Applications, Services and Engineering for Cognitive Cellular Systems
(EASE4CCS), July 201
Detection techniques of selective forwarding attacks in wireless sensor networks: a survey
The wireless sensor network has become a hot research area due its wide range
of application in military and civilian domain, but as it uses wireless media
for communication these are easily prone to security attacks. There are number
of attacks on wireless sensor networks like black hole attack, sink hole
attack, Sybil attack, selective forwarding attacks etc. in this paper we will
concentrate on selective forwarding attacks In selective forwarding attacks,
malicious nodes behave like normal nodes and selectively drop packets. The
selection of dropping nodes may be random. Identifying such attacks is very
difficult and sometimes impossible. In this paper we have listed up some
detection techniques, which have been proposed by different researcher in
recent years, there we also have tabular representation of qualitative analysis
of detection techniquesComment: 6 Page
New Shop Floor Control Approaches for Virtual Enterprises
The virtual enterprise paradigm seems a fit response to face market instability and the volatile nature of business opportunities increasing enterprise’s interest in similar forms of networked organisations. The dynamic environment of a virtual enterprise requires that partners in the consortium own reconfigurable shop floors. This paper presents new approaches to shop floor control that meet the requirements of the new industrial paradigms and argues on work re-organization at shop floor level.virtual enterprise; networked organisations
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
- …