331 research outputs found

    Evaluating the more suitable ISM frequency band for iot-based smart grids: a quantitative study of 915 MHz vs. 2400 MHz

    Get PDF
    IoT has begun to be employed pervasively in industrial environments and critical infrastructures thanks to its positive impact on performance and efficiency. Among these environments, the Smart Grid (SG) excels as the perfect host for this technology, mainly due to its potential to become the motor of the rest of electrically-dependent infrastructures. To make this SG-oriented IoT cost-effective, most deployments employ unlicensed ISM bands, specifically the 2400 MHz one, due to its extended communication bandwidth in comparison with lower bands. This band has been extensively used for years by Wireless Sensor Networks (WSN) and Mobile Ad-hoc Networks (MANET), from which the IoT technologically inherits. However, this work questions and evaluates the suitability of such a "default" communication band in SG environments, compared with the 915 MHz ISM band. A comprehensive quantitative comparison of these bands has been accomplished in terms of: power consumption, average network delay, and packet reception rate. To allow such a study, a dual-band propagation model specifically designed for the SG has been derived, tested, and incorporated into the well-known TOSSIM simulator. Simulation results reveal that only in the absence of other 2400 MHz interfering devices (such as WiFi or Bluetooth) or in small networks, is the 2400 MHz band the best option. In any other case, SG-oriented IoT quantitatively perform better if operating in the 915 MHz band.This research was supported by the MINECO/FEDER project grants TEC2013-47016-C2-2-R (COINS) and TEC2016-76465-C2-1-R (AIM). The authors would like to thank Juan Salvador Perez Madrid nd Domingo Meca (part of the Iberdrola staff) for the support provided during the realization of this work. Ruben M. Sandoval also thanks the Spanish MICINN for an FPU (REF FPU14/03424) pre-doctoral fellowship

    RPL Cross-Layer Scheme for IEEE 802.15.4 IoT Devices With Adjustable Transmit Power

    Get PDF
    Article number 9523554We propose a novel cross-layer scheme to reduce energy consumption in wireless sensor networks composed of IEEE 802.15.4 IoT devices with adjustable transmit power. Our approach is based on the IETFโ€™s Routing Protocol for Low power and lossy networks (RPL). Nodes discover neighbors and keep fresh link statistics for each available transmit power level. Using the product of ETX and local transmit power level as a single metric, each node selects both the parent that minimizes the energy for packet transmission along the path to the root and the optimal local transmit power to be used. We have implemented our cross-layer scheme in NG-Contiki using the Z1 mote and two transmit power levels (55mW and 31mW). Simulations of a network of 15 motes show that (on average) 66% of nodes selected the low-power setting in a 25 m ร— 25 m area. As a result, we obtained an average reduction of 25% of the energy spent on transmission and reception of packets compared to the standard RPL settings where all nodes use the same transmit power level. In large scenarios (e.g., 150 m ร— 150 m and 40-100 motes), our approach provides better results in dense networks where reducing the transmit power of nodes does not translate into longer paths to the root nor degraded quality of service

    Securing name resolution in the IoT: DNS over CoAP

    Full text link
    In this paper, we present the design, implementation, and analysis of DNS over CoAP (DoC), a new proposal for secure and privacy-friendly name resolution of constrained IoT devices. We implement different design choices of DoC in RIOT, an open-source operating system for the IoT, evaluate performance measures in a testbed, compare with DNS over UDP and DNS over DTLS, and validate our protocol design based on empirical DNS IoT data. Our findings indicate that plain DoC is on par with common DNS solutions for the constrained IoT but significantly outperforms when additional, CoAP standard features are used such as block-wise transfer or caching. With OSCORE for end-to-end security, we can save more than 10 kBytes of code memory compared to DTLS while enabling group communication without compromising the trust chain when using intermediate proxies or caches. We also discuss a scheme for very restricted links that compresses redundant or excessive information by up to 70%.Comment: 12 pages, 13 figures, 4 table

    Internet of Things: A Model for Cybersecurity Standards and the Categorisation of Devices

    Get PDF
    The networking of physical devices, including their infrastructure and data, is known as the Internet of Things. The number of networked devices is con- stantly increasing over the last years and is expected to continue to rise in the future. This also results in an increasing number of attacks on these devices which are considered potentially insecure. The reasons for the lack of cyber- security are diverse and lead, for example, to botnets and similar problems. Mandatory standards and guidelines can help to ensure cybersecurity re- gardless of a fast pace of development and a low price of the devices. In some areas, the development of these guidelines is already well advanced, ideally across countries as a European standard. However, problems with standardiza- tion are the different definitions of device categories and thus, the assignment of a device to a standard. Even in academia, definitions and categories for Internet of Things devices are ambiguous or completely lacking. This makes it difficult to find relevant publications. Therefore, a model of the Internet of Things was researched to solve these problems and define clear categories. The model divides the Internet of Things into categories, supplements the definitions with characteristics and distinguishes the different device types. The architectures and associated components are also considered. The model can be applied to all devices and available cybersecurity standards which is shown by mapping them to the model. The real-world applications are diverse and illustrated as different use cases. As digitalization evolves rapidly, the researched model is designed to adapt flexibly to new developments

    Fog Protocol and FogKit: A JSON-Based Protocol and Framework for Communication Between Bluetooth-Enabled Wearable Internet of Things Devices

    Get PDF
    Advancements in technology have brought about a wide variety of devices, such as embedded devices with sensors and actuators, personal computers, smart devices, and health devices. Many of these devices are categorized as โ€œwearables,โ€ meaning that they are intended to be carried and used on oneโ€™s body. As this category increases in popularity and functionality, developers will need a convenient way for these devices to communicate with each other and store information in a standardized and ecient manner. The Fog protocol and FogKit framework developed and demonstrated for this thesis address these issues by providing a set of powerful features, including data posting, data querying, event notifications, and network status requests. These features are defined as convenient JSON formatted messages which can be communicated between Bluetooth peripherals using an iOS device running FogKit as router and server

    Security and blockchain convergence with internet of multimedia things : current trends, research challenges and future directions

    Get PDF
    The Internet of Multimedia Things (IoMT) orchestration enables the integration of systems, software, cloud, and smart sensors into a single platform. The IoMT deals with scalar as well as multimedia data. In these networks, sensor-embedded devices and their data face numerous challenges when it comes to security. In this paper, a comprehensive review of the existing literature for IoMT is presented in the context of security and blockchain. The latest literature on all three aspects of security, i.e., authentication, privacy, and trust is provided to explore the challenges experienced by multimedia data. The convergence of blockchain and IoMT along with multimedia-enabled blockchain platforms are discussed for emerging applications. To highlight the significance of this survey, large-scale commercial projects focused on security and blockchain for multimedia applications are reviewed. The shortcomings of these projects are explored and suggestions for further improvement are provided. Based on the aforementioned discussion, we present our own case study for healthcare industry: a theoretical framework having security and blockchain as key enablers. The case study reflects the importance of security and blockchain in multimedia applications of healthcare sector. Finally, we discuss the convergence of emerging technologies with security, blockchain and IoMT to visualize the future of tomorrow's applications. ยฉ 2020 Elsevier Lt

    RFC9031: Constrained Join Protocol (CoJP) for 6TiSCH

    Get PDF
    International audienceThis document describes the minimal framework required for a new device, called a "pledge", to securely join a 6TiSCH (IPv6 over the Time-Slotted Channel Hopping mode of IEEE 802.15.4) network. The framework requires that the pledge and the JRC (Join Registrar/Coordinator, a central entity), share a symmetric key. How this key is provisioned is out of scope of this document. Through a single CoAP (Constrained Application Protocol) request-response exchange secured by OSCORE (Object Security for Constrained RESTful Environments), the pledge requests admission into the network, and the JRC configures it with link-layer keying material and other parameters. The JRC may at any time update the parameters through another request-response exchange secured by OSCORE. This specification defines the Constrained Join Protocol and its CBOR (Concise Binary Object Representation) data structures, and it describes how to configure the rest of the 6TiSCH communication stack for this join process to occur in a secure manner. Additional security mechanisms may be added on top of this minimal framework

    Demystifying Internet of Things Security

    Get PDF
    Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms

    LTE-LAA ์„ฑ๋Šฅ ํ–ฅ์ƒ์„ ์œ„ํ•œ MAC ๊ณ„์ธต ๊ธฐ๋ฒ•

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (๋ฐ•์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ๊ณต๊ณผ๋Œ€ํ•™ ์ „๊ธฐยท์ปดํ“จํ„ฐ๊ณตํ•™๋ถ€, 2019. 2. ์ตœ์„ฑํ˜„.3GPP long term evolution (LTE) operation in unlicensed spectrum is emerging as a promising technology in achieving higher data rate with LTE since ultra-wide unlicensed spectrum, e.g., about 500 MHz at 5โ€“6 GHz range, is available in most countries. Recently, 3GPP has finalized standardization of licensed-assisted access (LAA) for LTE operation in 5 GHz unlicensed spectrum, which has been a playground only for Wi-Fi. In this dissertation, we propose the following three strategies to enhance the performance of LAA: (1) Receiver-aware COT adaptation, (2) Collision-aware link adaptation, and (3) Power and energy detection threshold adaptation. First, LAA has a fixed maximum channel occupancy time (MCOT), which is the maximum continuous transmission time after channel sensing, while Wi-Fi may transmit for much shorter time duration. As a result, when Wi-Fi coexists with LAA, Wi-Fi airtime and throughput can be much less than those achieved when Wi-Fi coexists with another Wi-Fi. To guarantee fair airtime and improve throughput of Wi-Fi, we propose a receiver-aware channel occupancy time (COT) adaptation ( RACOTA ) algorithm, which observes Wi-Fi aggregate MAC protocol data unit (A-MPDU) frames and matches LAAs COT to the duration of A-MPDU frames when any Wi-Fi receiver has more data to receive. Moreover, RACOTA detects saturation of Wi-Fi traffic and adjusts COT only if Wi-Fi traffic is saturated. We prototype saturation detection algorithm of RACOTA with commercial off-the-shelf Wi-Fi device and show that RACOTA detects saturation of Wi-Fi networks accurately. Through ns-3 simulations, we demonstrate that RACOTA provides airtime fairness between LAA and Wi-Fi while achieves up to 334% Wi-Fi throughput gain. Second, the link adaptation scheme of the conventional LTE, adaptive modulation and coding (AMC), cannot operate well in the unlicensed band due to intermittent collisions. Intermittent collisions make LAA eNB lower modulation and coding scheme (MCS) for the subsequent transmission and such unnecessarily lowered MCS significantly degrades spectral efficiency. To address this problem, we propose a collision-aware link adaptation algorithm ( COALA ). COALA exploits k-means unsupervised clustering algorithm to discriminate channel quality indicator (CQI) reports which are measured with collision interference and selects the most suitable MCS for the next transmission. By prototype-based experiments, we demonstrate that COALA detects collisions accurately, and by conducting ns-3 simulations in various scenarios, we also show that COALA achieves up to 74.9% higher user perceived throughput than AMC. Finally, we propose PETAL to mitigate the negative impact of spatial reuse (SR) operation. We first design the baseline algorithm, which operates SR aggressively, and show that the baseline algorithm degrades the throughput performance severely when the UE is close to an interferer. Our proposed algorithm PETAL estimates and compares the spectral efficiency for the SR operation and non-SR operation. Then, PETAL operates SR only if the spectral efficiency of SR operation is expected to be higher than the case of non-SR operation. Our simulation verifies the performance of PETAL in various scenarios. When two pair of an eNB and a UE coexists, PETAL improves the throughput by up to 329% over the baseline algorithm. In summary, we identify interesting problems that appeared with LAA and shows the impact of the problems through the extensive simulations and propose compelling algorithms to solve the problems. The airtime fairness between Wi-Fi and LAA is improved with COT adaptation. Furthermore, link adaptation accuracy and SR operation are improved by exploiting CQI reports history. The performance of the proposed schemes is verified by system level simulation.๋น„๋ฉดํ—ˆ ๋Œ€์—ญ์—์„œ์˜ LTE ๋™์ž‘์€ ๋” ๋†’์€ ๋ฐ์ดํ„ฐ ์ „์†ก๋ฅ ์„ ๋‹ฌ์„ฑํ•˜๋Š” ์œ ๋งํ•œ ๊ธฐ์ˆ ๋กœ ๋ถ€๊ฐ๋˜๊ณ  ์žˆ๋‹ค. ์ตœ๊ทผ 3GPP๋Š” ๊ธฐ์กด Wi-Fi ๊ธฐ์ˆ ์ด ์‚ฌ์šฉํ•˜๋˜ 5 GHz ๋น„๋ฉดํ—ˆ ๋Œ€์—ญ์—์„œ LTE๋ฅผ ์‚ฌ์šฉํ•˜๋Š” licensed-assisted access (LAA) ๊ธฐ์ˆ ์˜ ํ‘œ์ค€ํ™”๋ฅผ ์™„๋ฃŒํ•˜์˜€๋‹ค. ๋ณธ ๋…ผ๋ฌธ์—์„œ ์šฐ๋ฆฌ๋Š” LAA์˜ ์„ฑ๋Šฅ์„ ํ–ฅ์ƒ์‹œํ‚ค๊ธฐ ์œ„ํ•ด ๋‹ค์Œ๊ณผ ๊ฐ™์€ ์„ธ ๊ฐ€์ง€ ์ „๋žต์„ ์ œ์•ˆํ•œ๋‹ค: (1) ์ˆ˜์‹ ๊ธฐ ์ธ์‹ ์ฑ„๋„ ์ ์œ  ์‹œ๊ฐ„ ์ ์‘, (2) ์ถฉ๋Œ ์ธ์‹ ๋งํฌ ์ ์‘, (3) ์ „๋ ฅ ๋ฐ ์—๋„ˆ์ง€ ๊ฒ€์ถœ ์—ญ์น˜ ์ ์‘. ์ฒซ์งธ, LAA๋Š” ๊ณ ์ •๋œ ์ตœ๋Œ€ ์ฑ„๋„ ์ ์œ  ์‹œ๊ฐ„์„ ๊ฐ€์ง€๊ณ  ์žˆ๊ณ  ๊ทธ ์‹œ๊ฐ„ ๋งŒํผ ์—ฐ์†์ ์œผ๋กœ ์ „์†กํ•  ์ˆ˜ ์žˆ๋Š” ๋ฐ˜๋ฉด, Wi-Fi๋Š” ๋น„๊ต์  ์งง์€ ์‹œ๊ฐ„ ๋™์•ˆ๋งŒ ์—ฐ์†์ ์œผ๋กœ ์ „์†กํ•  ์ˆ˜ ์žˆ๋‹ค. ๊ทธ ๊ฒฐ๊ณผ Wi-Fi๊ฐ€ LAA์™€ ๊ณต์กดํ•  ๋•Œ Wi-Fi์˜ airtime๊ณผ ์ˆ˜์œจ ์„ฑ๋Šฅ์€ Wi-Fi๊ฐ€ ๋˜ ๋‹ค๋ฅธ Wi-Fi์™€ ๊ณต์กดํ•  ๋•Œ์— ๋น„ํ•˜์—ฌ ์ €ํ•˜๋˜๊ฒŒ๋œ๋‹ค. ๋”ฐ๋ผ์„œ ์šฐ๋ฆฌ๋Š” Wi-Fi์˜ airtime๊ณผ ์ˆ˜์œจ ์„ฑ๋Šฅ์„ ํ–ฅ์ƒ์‹œํ‚ค๊ธฐ ์œ„ํ•˜์—ฌ Wi-Fi์˜ A-MPDU ํ”„๋ ˆ์ž„ ์ „์†ก ์‹œ๊ฐ„์— ๋งž์ถ”์–ด LAA์˜ ์ฑ„๋„ ์ ์œ  ์‹œ๊ฐ„์„ ์กฐ์ ˆํ•˜๋Š” ์ˆ˜์‹ ๊ธฐ ์ธ์‹ ์ฑ„๋„ ์ ์œ  ์‹œ๊ฐ„ ์ ์‘ ๊ธฐ๋ฒ•์ธ RACOTA๋ฅผ ์ œ์•ˆํ•œ๋‹ค. RACOTA ๋Š” ํฌํ™” ๊ฐ์ง€ ๊ฒฐ๊ณผ Wi-Fi ์ˆ˜์‹ ๊ธฐ๊ฐ€ ๋” ๋ฐ›์„ ๋ฐ์ดํ„ฐ๊ฐ€ ์žˆ๋‹ค๊ณ  ํŒ๋‹จ๋  ๋•Œ์—๋งŒ ์ฑ„๋„ ์ ์œ  ์‹œ๊ฐ„์„ ์กฐ์ ˆํ•œ๋‹ค. ์šฐ๋ฆฌ๋Š” RACOTA ์˜ ํฌํ™” ๊ฐ์ง€ ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ์ƒ์šฉ Wi-Fi ์žฅ๋น„์— ๊ตฌํ˜„ํ•˜์—ฌ ์ด๋ฅผ ๋ฐ”ํƒ•์œผ๋กœ ์‹ค์ธก์„ ํ†ตํ•ด RACOTA ๊ฐ€ ๊ณต์กดํ•˜๋Š” Wi-Fi์˜ ํฌํ™” ์—ฌ๋ถ€๋ฅผ ์ •ํ™•ํ•˜๊ฒŒ ๊ฐ์ง€ํ•ด๋ƒ„์„ ๋ณด์ธ๋‹ค. ๋˜ํ•œ ์šฐ๋ฆฌ๋Š” ns-3 ์‹œ๋ฎฌ๋ ˆ์ด์…˜์„ ํ†ตํ•˜์—ฌ RACOTA ๋ฅผ ์‚ฌ์šฉํ•˜๋Š” LAA๊ฐ€ ๊ณต์กดํ•˜๋Š” Wi-Fi์—๊ฒŒ ๊ณต์ •ํ•œ airtime์„ ์ œ๊ณตํ•˜๊ณ  ๊ธฐ์กด LAA์™€ ๊ณต์กดํ•˜๋Š” Wi-Fi ๋Œ€๋น„ ์ตœ๋Œ€ 334%์˜ Wi-Fi ์ˆ˜์œจ ์„ฑ๋Šฅ ํ–ฅ์ƒ์„ ๊ฐ€์ ธ์˜ด์„ ๋ณด์ธ๋‹ค. ๋‘˜์งธ, ๊ฐ„ํ—์ ์ธ ์ถฉ๋Œ์ด ๋ฐœ์ƒํ•  ์ˆ˜ ์žˆ๋Š” ๋น„๋ฉดํ—ˆ ๋Œ€์—ญ์—์„œ๋Š” ๊ธฐ์กด LTE์˜ ๋งํฌ ์ ์‘ ๊ธฐ๋ฒ•์ธ adaptive modulation and coding (AMC)์ด ์ž˜ ๋™์ž‘ํ•˜์ง€ ์•Š์„ ์ˆ˜ ์žˆ๋‹ค. ๊ฐ„ํ—์ ์ธ ์ถฉ๋Œ์€ LAA ๊ธฐ์ง€๊ตญ์œผ๋กœ ํ•˜์—ฌ๊ธˆ modulation and coding scheme (MCS)์„ ๋‚ฎ์ถ”์–ด์„œ ๋‹ค์Œ ์ „์†ก์„ ํ•˜๋„๋ก ํ•˜๋Š”๋ฐ ๋‹ค์Œ ์ „์†ก ์‹œ์— ์ถฉ๋Œ์ด ๋ฐœ์ƒํ•˜์ง€ ์•Š๋Š”๋‹ค๋ฉด ๋ถˆํ•„์š”ํ•˜๊ฒŒ ๋‚ฎ์ถ˜ MCS๋กœ ์ธํ•ด ์ฃผํŒŒ์ˆ˜ ํšจ์œจ์ด ํฌ๊ฒŒ ์ €ํ•˜๋œ๋‹ค. ์ด๋Ÿฌํ•œ ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ์œ„ํ•ด ์šฐ๋ฆฌ๋Š” ์ถฉ๋Œ ์ธ์‹ ๋งํฌ ์ ์‘ ๊ธฐ๋ฒ•์ธ COALA ๋ฅผ ์ œ์•ˆํ•œ๋‹ค. COALA ๋Š” k-means ๋ฌด๊ฐ๋… ํด๋Ÿฌ์Šคํ„ฐ๋ง ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ์‚ฌ์šฉํ•˜์—ฌ channel quality indicator (CQI) ๋ฆฌํฌํŠธ ์ค‘ ์ถฉ๋Œ ๊ฐ„์„ญ์— ์˜ํ–ฅ์„ ๋ฐ›์€ CQI ๋ฆฌํฌํŠธ๋“ค์„ ๊ตฌ๋ณ„ํ•ด๋‚ด๊ณ  ์ด๋ฅผ ํ†ตํ•ด ๋‹ค์Œ ์ „์†ก์„ ์œ„ํ•œ ์ตœ์ ์˜ MCS๋ฅผ ์„ ํƒํ•œ๋‹ค. ์šฐ๋ฆฌ๋Š” ์‹ค์ธก์„ ํ†ตํ•˜์—ฌ COALA ๊ฐ€ ์ •ํ™•ํ•˜๊ฒŒ ์ถฉ๋Œ์„ ๊ฐ์ง€ํ•ด๋ƒ„์„ ๋ณด์ธ๋‹ค. ๋˜ํ•œ ์šฐ๋ฆฌ๋Š” ๋‹ค์–‘ํ•œ ํ™˜๊ฒฝ์—์„œ์˜ ns-3 ์‹œ๋ฎฌ๋ ˆ์ด์…˜์„ ํ†ตํ•˜์—ฌ COALA ๊ฐ€ AMC ๋Œ€๋น„ ์ตœ๋Œ€ 74.9%์˜ ์‚ฌ์šฉ์ž ์ธ์‹ ์ˆ˜์œจ ์„ฑ๋Šฅ ํ–ฅ์ƒ์„ ๊ฐ€์ ธ์˜ด์„ ๋ณด์ธ๋‹ค. ์…‹์งธ, ์šฐ๋ฆฌ๋Š” ๊ณต๊ฐ„ ์žฌ์‚ฌ์šฉ ๋™์ž‘์˜ ๋ถ€์ž‘์šฉ์„ ์ตœ์†Œํ™”ํ•˜๊ธฐ ์œ„ํ•˜์—ฌ ์ˆ˜์‹  ๋‹จ๋ง์„ ๊ณ ๋ คํ•˜์—ฌ ์ „์†ก ํŒŒ์›Œ ๋ฐ ์—๋„ˆ์ง€ ๊ฒ€์ถœ ์—ญ์น˜๋ฅผ ์ ์‘์ ์œผ๋กœ ์กฐ์ ˆํ•˜๋Š” PETAL ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ์ œ์•ˆํ•œ๋‹ค. ์šฐ๋ฆฌ๋Š” ๋จผ์ € ์ˆ˜์‹  ๋‹จ๋ง์„ ๊ณ ๋ คํ•˜์ง€ ์•Š๊ณ  ๊ณต๊ฒฉ์ ์œผ๋กœ ๊ณต๊ฐ„ ์žฌ์‚ฌ์šฉ ๋™์ž‘์„ ํ•˜๋Š” baseline ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ์„ค๊ณ„ํ•˜๊ณ  ๋‹ค์–‘ํ•œ ํ™˜๊ฒฝ์—์„œ์˜ ์‹œ๋ฎฌ๋ ˆ์ด์…˜์„ ํ†ตํ•˜์—ฌ ์ˆ˜์‹  ๋‹จ๋ง์ด ๊ฐ„์„ญ์›์— ๊ฐ€๊นŒ์šด ๊ฒฝ์šฐ baseline ์•Œ๊ณ ๋ฆฌ์ฆ˜์˜ ์„ฑ๋Šฅ์ด ์‹ฌ๊ฐํ•˜๊ฒŒ ์—ดํ™”๋จ์„ ๋ณด์ธ๋‹ค. ์ œ์•ˆํ•˜๋Š” ์•Œ๊ณ ๋ฆฌ์ฆ˜์ธ PETAL ์€ ์ˆ˜์‹  ๋‹จ๋ง๋กœ๋ถ€ํ„ฐ ๋ฐ›์€ CQI ๋ฆฌํฌํŠธ ์ •๋ณด์™€ ์ฑ„๋„ ์ ์œ  ์‹œ์ ๊นŒ์ง€์˜ ํ‰๊ท  ๋Œ€๊ธฐ ์‹œ๊ฐ„์„ ์ด์šฉํ•˜์—ฌ ๊ณต๊ฐ„ ์žฌ์‚ฌ์šฉ ๋™์ž‘์„ ํ•  ๋•Œ ์˜ˆ์ƒ๋˜๋Š” ์ฃผํŒŒ์ˆ˜ ํšจ์œจ๊ณผ ๊ณต๊ฐ„ ์žฌ์‚ฌ์šฉ ๋™์ž‘์„ ํ•˜์ง€ ์•Š์„ ๋•Œ ์˜ˆ์ƒ๋˜๋Š” ์ฃผํŒŒ์ˆ˜ ํšจ์œจ์„ ๋น„๊ตํ•˜์—ฌ ๊ณต๊ฐ„ ์žฌ์‚ฌ์šฉ ๋™์ž‘์„ ํ•  ๋•Œ ์˜ˆ์ƒ๋˜๋Š” ์ฃผํŒŒ์ˆ˜ ํšจ์œจ์ด ๋” ํด ๋•Œ์—๋งŒ ๊ณต๊ฐ„ ์žฌ์‚ฌ์šฉ ๋™์ž‘์„ ํ•œ๋‹ค. ์šฐ๋ฆฌ๋Š” ๋‹ค์–‘ํ•œ ํ™˜๊ฒฝ์—์„œ์˜ ns-3 ์‹œ๋ฎฌ๋ ˆ์ด์…˜์„ ํ†ตํ•˜์—ฌ PETAL ์ด baseline ์•Œ๊ณ ๋ฆฌ์ฆ˜ ๋Œ€๋น„ ์ตœ๋Œ€ 329%์˜ ์ˆ˜์œจ ์„ฑ๋Šฅ ํ–ฅ์ƒ์„ ๊ฐ€์ ธ์˜ด์„ ๋ณด์ธ๋‹ค. ์š”์•ฝํ•˜์ž๋ฉด, ์šฐ๋ฆฌ๋Š” LAA์˜ ๋“ฑ์žฅ๊ณผ ํ•จ๊ป˜ ์ƒˆ๋กญ๊ฒŒ ๋Œ€๋‘๋˜๋Š” ํฅ๋ฏธ๋กœ์šด ๋ฌธ์ œ๋“ค์„ ํ™•์ธํ•˜๊ณ  ๋ฌธ์ œ๋“ค์˜ ์‹ฌ๊ฐ์„ฑ์„ ๋‹ค์–‘ํ•œ ํ™˜๊ฒฝ์—์„œ์˜ ์‹œ๋ฎฌ๋ ˆ์ด์…˜์„ ํ†ตํ•˜์—ฌ ์‚ดํŽด๋ณด๊ณ  ์ด ๋Ÿฌํ•œ ๋ฌธ์ œ๋“ค์„ ํ•ด๊ฒฐํ•  ์ˆ˜ ์žˆ๋Š” ์•Œ๊ณ ๋ฆฌ์ฆ˜๋“ค์„ ์ œ์•ˆํ•œ๋‹ค. Wi-Fi์™€ LAA ์‚ฌ์ด์˜ airtime ๊ณต์ •์„ฑ์€ LAA์˜ ์—ฐ์† ์ „์†ก ์‹œ๊ฐ„์„ ์ ์‘์ ์œผ๋กœ ์กฐ์ ˆํ•˜์—ฌ ๊ฐœ์„ ํ•  ์ˆ˜ ์žˆ๋‹ค. ๋˜ํ•œ ๋งํฌ ์ ์‘ ์ •ํ™•๋„์™€ ๊ณต๊ฐ„ ์žฌ์‚ฌ์šฉ ๋™์ž‘์˜ ํšจ์œจ์„ฑ์€ CQI ๋ฆฌํฌํŠธ๋“ค์˜ ๋ถ„ํฌ๋ฅผ ์ด์šฉํ•˜์—ฌ ๊ฐœ์„ ํ•  ์ˆ˜ ์žˆ๋‹ค. ์ œ์•ˆํ•˜๋Š” ์•Œ๊ณ ๋ฆฌ์ฆ˜๋“ค์˜ ์„ฑ๋Šฅ์€ ์‹œ์Šคํ…œ ๋ ˆ๋ฒจ ์‹œ๋ฎฌ๋ ˆ์ด์…˜์„ ํ†ตํ•˜์—ฌ ๊ฒ€์ฆ๋˜์—ˆ๋‹ค.1 Introduction 1 1.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Overview of Existing Approaches . . . . . . . . . . . . . . . . . . . 2 1.3 Main Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.3.1 RACOTA: Receiver-Aware Channel Occupancy Time Adaptation for LTE-LAA . . . . . . . 2 1.3.2 COALA: Collision-Aware Link Adaptation for LTE-LAA . . 3 1.3.3 PETAL: Power and Energy Detection Threshold Adaptation for LAA . . . . . . . . . . . . . . 4 1.4 Organization of the Dissertation . . . . . . . . . . . . . . . . . . . . 5 2 RACOTA:Receiver-AwareChannelOccupancyTimeAdaptationforLTE- LAA 6 2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.2 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 2.3 MAC Mechanisms of Wi-Fi and LAA . . . . . . . . . . . . . . . . . 10 2.3.1 Wi-Fi MAC Operation . . . . . . . . . . . . . . . . . . . . . 10 2.3.2 LAA Listen-Before-Talk (LBT) Mechanism . . . . . . . . . . 11 2.3.3 Wide Bandwidth Operation . . . . . . . . . . . . . . . . . . 13 2.4 Coexistence performance of LAA and Wi-Fi . . . . . . . . . . . . . . 14 2.4.1 Simulation Setup . . . . . . . . . . . . . . . . . . . . . . . . 14 2.4.2 Unfairness between LAA and Wi-Fi . . . . . . . . . . . . . . 15 2.5 Receiver-Aware COT Adaptation Algorithm . . . . . . . . . . . . . . 17 2.5.1 Saturation Detection (SD) . . . . . . . . . . . . . . . . . . . 20 2.5.2 Receiver-Aware COT Decision . . . . . . . . . . . . . . . . . 22 2.6 Performance Evaluation of SD Algorithm . . . . . . . . . . . . . . . 22 2.6.1 Measurement Setup . . . . . . . . . . . . . . . . . . . . . . . 22 2.6.2 PPDUMaxTime Detection . . . . . . . . . . . . . . . . . . . 24 2.6.3 Saturation Detection Performance . . . . . . . . . . . . . . . 26 2.7 Performance Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . 27 2.7.1 Saturated Traffic Scenario . . . . . . . . . . . . . . . . . . . 28 2.7.2 Unsaturated Traffic Scenario . . . . . . . . . . . . . . . . . . 30 2.7.3 Bursty Traffic Scenario . . . . . . . . . . . . . . . . . . . . . 30 2.7.4 Heterogeneous Wi-Fi Traffic Generation Scenario . . . . . . 31 2.7.5 Multiple Node Scenario . . . . . . . . . . . . . . . . . . . . 34 2.8 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 3 COALA: Collision-Aware Link Adaptation for LTE-LAA 36 3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 3.2 Backgound and Related Work . . . . . . . . . . . . . . . . . . . . . 38 3.2.1 LAA and LBT . . . . . . . . . . . . . . . . . . . . . . . . . 38 3.2.2 AMC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 3.2.3 Inter-Cell Interference Cancellation . . . . . . . . . . . . . . 39 3.2.4 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . 40 3.3 Impact of Collision to Link Adaptation . . . . . . . . . . . . . . . . . 41 3.4 COALA: Collision-aware Link Adaptation . . . . . . . . . . . . . . . 47 3.4.1 CQI Clustering Algorithm . . . . . . . . . . . . . . . . . . . 48 3.4.2 Collision Detection and Collision Probability Estimation . . . 48 3.4.3 Suitable MCS Selection . . . . . . . . . . . . . . . . . . . . 49 3.5 Performance Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . 50 3.5.1 Prototype-based Feasibility Study . . . . . . . . . . . . . . . 51 3.5.2 Contention Collision with LAA eNBs . . . . . . . . . . . . . 53 3.5.3 Hidden Collision . . . . . . . . . . . . . . . . . . . . . . . . 57 3.5.4 Bursty Hidden Collision . . . . . . . . . . . . . . . . . . . . 58 3.5.5 Contention Collision with Wi-Fi Transmitters . . . . . . . . . 58 3.6 Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 3.7 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 4 PETAL: Power and Energy Detection Threshold Adaptation for LAA 62 4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 4.2 Backgound and Related Work . . . . . . . . . . . . . . . . . . . . . 64 4.2.1 Energy Detection Threshold . . . . . . . . . . . . . . . . . . 64 4.2.2 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . 64 4.3 Baseline Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 4.3.1 Design of the Baseline Algorithm . . . . . . . . . . . . . . . 65 4.3.2 Performance of the Baseline Algorithm . . . . . . . . . . . . 66 4.4 PETAL: Power and Energy Detection Threshold Adaptation . . . . . 68 4.4.1 CQI Management . . . . . . . . . . . . . . . . . . . . . . . . 69 4.4.2 Success Probability and Airtime Ratio Estimation . . . . . . . 69 4.4.3 CQI Clustering Algorithm . . . . . . . . . . . . . . . . . . . 71 4.4.4 SR Decision . . . . . . . . . . . . . . . . . . . . . . . . . . 71 4.5 Performance Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . 71 4.5.1 Two Cell Scenario . . . . . . . . . . . . . . . . . . . . . . . 73 4.5.2 Coexistence with Standard LAA . . . . . . . . . . . . . . . . 75 4.5.3 Four Cell Scenario . . . . . . . . . . . . . . . . . . . . . . . 76 4.6 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 5 Concluding Remarks 79 5.1 Research Contributions . . . . . . . . . . . . . . . . . . . . . . . . . 79 Abstract (In Korean) 88 ๊ฐ์‚ฌ์˜ ๊ธ€ 92Docto
    • โ€ฆ
    corecore