245,488 research outputs found
TraPy-MAC: Traffic Priority Aware Medium Access Control Protocol for Wireless Body Area Network
Recently, Wireless Body Area Network (WBAN) has witnessed significant attentions in research and product development due to the growing number of sensor-based applications in healthcare domain. Design of efficient and effective Medium Access Control (MAC) protocol is one of the fundamental research themes in WBAN. Static on-demand slot allocation to patient data is the main approach adopted in the design of MAC protocol in literature, without considering the type of patient data specifically the level of severity on patient data. This leads to the degradation of the performance of MAC protocols considering effectiveness and traffic adjustability in realistic medical environments. In this context, this paper proposes a Traffic Priority-Aware MAC (TraPy-MAC) protocol for WBAN. It classifies patient data into emergency and non-emergency categories based on the severity of patient data. The threshold value aided classification considers a number of parameters including type of sensor, body placement location, and data transmission time for allocating dedicated slots patient data. Emergency data are not required to carry out contention and slots are allocated by giving the due importance to threshold value of vital sign data. The contention for slots is made efficient in case of non-emergency data considering threshold value in slot allocation. Moreover, the slot allocation to emergency and non-emergency data are performed parallel resulting in performance gain in channel assignment. Two algorithms namely, Detection of Severity on Vital Sign data (DSVS), and ETS Slots allocation based on the Severity on Vital Sign (ETS-SVS) are developed for calculating threshold value and resolving the conflicts of channel assignment, respectively. Simulations are performed in ns2 and results are compared with the state-of-the-art MAC techniques. Analysis of results attests the benefit of TraPy-MAC in comparison with the state-of-the-art MAC in channel assignment in realistic medical environments
Memory-full context-aware predictive mobility management in dual connectivity 5G networks
Network densification with small cell deployment is being considered as one of the dominant themes in the fifth generation (5G) cellular system. Despite the capacity gains, such deployment scenarios raise several challenges from mobility management perspective. The small cell size, which implies a small cell residence time, will increase the handover (HO) rate dramatically. Consequently, the HO latency will become a critical consideration in the 5G era. The latter requires an intelligent, fast and light-weight HO procedure with minimal signalling overhead. In this direction, we propose a memory-full context-aware HO scheme with mobility prediction to achieve the aforementioned objectives. We consider a dual connectivity radio access network architecture with logical separation between control and data planes because it offers relaxed constraints in implementing the predictive approaches. The proposed scheme predicts future HO events along with the expected HO time by combining radio frequency performance to physical proximity along with the user context in terms of speed, direction and HO history. To minimise the processing and the storage requirements whilst improving the prediction performance, a user-specific prediction triggering threshold is proposed. The prediction outcome is utilised to perform advance HO signalling whilst suspending the periodic transmission of measurement reports. Analytical and simulation results show that the proposed scheme provides promising gains over the conventional approach
Distributed SIR-Aware Opportunistic Access Control for D2D Underlaid Cellular Networks
In this paper, we propose a distributed interference and channel-aware
opportunistic access control technique for D2D underlaid cellular networks, in
which each potential D2D link is active whenever its estimated
signal-to-interference ratio (SIR) is above a predetermined threshold so as to
maximize the D2D area spectral efficiency. The objective of our SIR-aware
opportunistic access scheme is to provide sufficient coverage probability and
to increase the aggregate rate of D2D links by harnessing interference caused
by dense underlaid D2D users using an adaptive decision activation threshold.
We determine the optimum D2D activation probability and threshold, building on
analytical expressions for the coverage probabilities and area spectral
efficiency of D2D links derived using stochastic geometry. Specifically, we
provide two expressions for the optimal SIR threshold, which can be applied in
a decentralized way on each D2D link, so as to maximize the D2D area spectral
efficiency derived using the unconditional and conditional D2D success
probability respectively. Simulation results in different network settings show
the performance gains of both SIR-aware threshold scheduling methods in terms
of D2D link coverage probability, area spectral efficiency, and average sum
rate compared to existing channel-aware access schemes.Comment: 6 pages, 6 figures, to be presented at IEEE GLOBECOM 201
Forever Young: Aging Control For Smartphones In Hybrid Networks
The demand for Internet services that require frequent updates through small
messages, such as microblogging, has tremendously grown in the past few years.
Although the use of such applications by domestic users is usually free, their
access from mobile devices is subject to fees and consumes energy from limited
batteries. If a user activates his mobile device and is in range of a service
provider, a content update is received at the expense of monetary and energy
costs. Thus, users face a tradeoff between such costs and their messages aging.
The goal of this paper is to show how to cope with such a tradeoff, by devising
\emph{aging control policies}. An aging control policy consists of deciding,
based on the current utility of the last message received, whether to activate
the mobile device, and if so, which technology to use (WiFi or 3G). We present
a model that yields the optimal aging control policy. Our model is based on a
Markov Decision Process in which states correspond to message ages. Using our
model, we show the existence of an optimal strategy in the class of threshold
strategies, wherein users activate their mobile devices if the age of their
messages surpasses a given threshold and remain inactive otherwise. We then
consider strategic content providers (publishers) that offer \emph{bonus
packages} to users, so as to incent them to download updates of advertisement
campaigns. We provide simple algorithms for publishers to determine optimal
bonus levels, leveraging the fact that users adopt their optimal aging control
strategies. The accuracy of our model is validated against traces from the
UMass DieselNet bus network.Comment: See also http://www-net.cs.umass.edu/~sadoc/agecontrol
Search Me If You Can: Privacy-preserving Location Query Service
Location-Based Service (LBS) becomes increasingly popular with the dramatic
growth of smartphones and social network services (SNS), and its context-rich
functionalities attract considerable users. Many LBS providers use users'
location information to offer them convenience and useful functions. However,
the LBS could greatly breach personal privacy because location itself contains
much information. Hence, preserving location privacy while achieving utility
from it is still an challenging question now. This paper tackles this
non-trivial challenge by designing a suite of novel fine-grained
Privacy-preserving Location Query Protocol (PLQP). Our protocol allows
different levels of location query on encrypted location information for
different users, and it is efficient enough to be applied in mobile platforms.Comment: 9 pages, 1 figure, 2 tables, IEEE INFOCOM 201
- …