63 research outputs found

    Dynamic Channel Access Scheme for Interference Mitigation in Relay-assisted Intra-WBANs

    Full text link
    This work addresses problems related to interference mitigation in a single wireless body area network (WBAN). In this paper, We propose a distributed \textit{C}ombined carrier sense multiple access with collision avoidance (CSMA/CA) with \textit{F}lexible time division multiple access (\textit{T}DMA) scheme for \textit{I}nterference \textit{M}itigation in relay-assisted intra-WBAN, namely, CFTIM. In CFTIM scheme, non interfering sources (transmitters) use CSMA/CA to communicate with relays. Whilst, high interfering sources and best relays use flexible TDMA to communicate with coordinator (C) through using stable channels. Simulation results of the proposed scheme are compared to other schemes and consequently CFTIM scheme outperforms in all cases. These results prove that the proposed scheme mitigates interference, extends WBAN energy lifetime and improves the throughput. To further reduce the interference level, we analytically show that the outage probability can be effectively reduced to the minimal.Comment: 2015 IEEE International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS), Paris, France. arXiv admin note: text overlap with arXiv:1602.0865

    LIPADE's Research Efforts Wireless Body Sensor Networks

    Get PDF

    A QoS-aware cache replacement policy for Vehicular Named Data Networks

    Get PDF
    International audienceVehicular Named Data Network (VNDN) uses Named Data Network (NDN) as a communication enabler. The communication is achieved using the content name instead of the host address. NDN integrates content caching at the network level rather than the application level. Hence, the network becomes aware of content caching and delivering. The content caching is a fundamental element in VNDN communication. However, due to the limitations of the cache store, only the most used content should be cached while the less used should be evicted. Traditional caching replacement policies may not work efficiently in VNDN due to the large and diverse exchanged content. To solve this issue, we propose an efficient cache replacement policy that takes the quality of service into consideration. The idea consists of classifying the traffic into different classes, and split the cache store into a set of sub-cache stores according to the defined traffic classes with different storage capacities according to the network requirements. Each content is assigned a popularity-density value that balances the content popularity with its size. Content with the highest popularity-density value is cached while the lowest is evicted. Simulation results prove the efficiency of the proposed solution to enhance the overall network quality of service

    Coexistence of ICN and IP networks: an NFV as a service approach

    Get PDF
    International audienceIn contrast to the current host-centric architecture, Information-Centric Networking (ICN) adopts content naming instead of host address and in-network caching to enhance the content delivery, improve the data distribution, and satisfy users' requirements. As ICN is being incrementally deployed in different real-world scenarios, it will exist with IP-based services in a hybrid network setting. Full deployment of ICN and total replacement of IP protocol is not feasible at the current stage since IP is dominating the Internet. On the other hand, redesigning TCP/IP applications from ICN perspective is a time-consuming task and requires a careful investigation from both business and technical point of view. Thus, the coexistence of ICN and IP is one of the suitable solutions. Towards this end, we propose a simple yet efficient coexistence solution based on Network Function Virtualization (NFV) technology. We define a set of communication regions and control virtual functions. A gateway node is used as an intermediate entity to fetch and deliver content over regions. The simulation results show that the proposed approach is valid and allow content fetching and delivering from different ICN and/to IP regions in an efficient manner

    A Blockchain-Based Network Slice Broker for 5G Services

    Get PDF
    With advent of 5G, the classical mobile network business model is shifting from a network-operator-oriented business to a more open system with several actors. In this context, the Network Slice provider will play the role of an intermediate entity between the vertical service provider and the resource provider. To deploy a network slice, the network slice provider will require a brokering mechanism, which allows it to lease resources from different providers in a secure and private way. In this paper we propose a broker design based on Blockchain technology, providing a mechanism that secures and ensures anonymous transactions.This work was partially funded by the European Union’s Horizon 2020 research and innovation program under the 5G-Transformer project (grant no. 761536). Dr. Ksentini is corresponding author

    Access Control Mechanisms in Named Data Networks:A Comprehensive Survey

    Get PDF
    Information-Centric Networking (ICN) has recently emerged as a prominent candidate for the Future Internet Architecture (FIA) that addresses existing issues with the host-centric communication model of the current TCP/IP-based Internet. Named Data Networking (NDN) is one of the most recent and active ICN architectures that provides a clean slate approach for Internet communication. NDN provides intrinsic content security where security is directly provided to the content instead of communication channel. Among other security aspects, Access Control (AC) rules specify the privileges for the entities that can access the content. In TCP/IP-based AC systems, due to the client-server communication model, the servers control which client can access a particular content. In contrast, ICN-based networks use content names to drive communication and decouple the content from its original location. This phenomenon leads to the loss of control over the content causing different challenges for the realization of efficient AC mechanisms. To date, considerable efforts have been made to develop various AC mechanisms in NDN. In this paper, we provide a detailed and comprehensive survey of the AC mechanisms in NDN. We follow a holistic approach towards AC in NDN where we first summarize the ICN paradigm, describe the changes from channel-based security to content-based security and highlight different cryptographic algorithms and security protocols in NDN. We then classify the existing AC mechanisms into two main categories: Encryption-based AC and Encryption-independent AC. Each category has different classes based on the working principle of AC (e.g., Attribute-based AC, Name-based AC, Identity-based AC, etc). Finally, we present the lessons learned from the existing AC mechanisms and identify the challenges of NDN-based AC at large, highlighting future research directions for the community.Comment: This paper has been accepted for publication by the ACM Computing Surveys. The final version will be published by the AC

    Energy management for electric vehicles in smart cities: a deep learning approach

    Get PDF
    International audienceWe propose a solution for Electric Vehicle (EV) energy management in smart cities, where a deep learning approach is used to enhance the energy consumption of electric vehicles by trajectory and delay predictions. Two Recurrent Neural Networks are adapted and trained on 60 days of urban traffic. The trained networks show precise prediction of trajec-tory and delay, even for long prediction intervals. An algorithm is designed and applied on well known energy models for traction and air conditioning. We show how it can prevent from a battery exhaustion. Experimental results combining both RNN and energy models demonstrate the efficiency of the proposed solution in terms of route trajectory and delay prediction, enhancing the energy managemen
    • …
    corecore