194 research outputs found

    The hint protocol: Using a broadcast method to enable ID-free data transmission for dense IoT devices

    Get PDF
    IoT (Internet of Things) has attracted a lot of attention recently. IoT devices need to report their data or status to base stations at various frequencies. The IoT communications observed by a base station normally exhibit the following characteristics: (1) massively connected, (2) lightly loaded per packet, and (3) periodical or at least mostly predictable. The current design principals of communication networks, when applied to IoT scenarios, however, do not fit well to these requirements. For example, an IPv6 address is 128 bits, which is much longer than a 16-bit temperature report. Also, contending to send a small packet is not cost-effective. In this work, we propose a novel framework, which is slot-based, schedule-oriented, and identity-free for uploading IoT devices' data. We show that it fits very well for IoT applications. We propose two schemes, from an ideal one to a more practical one. The main idea is to bundle time slots with certain hashing functions of device IDs, thus significantly reducing transmission overheads, including device IDs and contention overheads

    Secure bootstrapping and routing in an IPv6-based ad hoc network

    Get PDF
    The mobile ad hoc network (MANET), which is characterized by an infrastructureless architecture and multi-hop communication, has attracted a lot of attention recently. In the evolution of IP networks to version 6, adopting the same protocol would guarantee the success and portability of MANETs. In this paper, we propose a secure bootstrapping and routing protocol for MANETs. Mobile hosts can autoconfigure and even change their IP addresses based on the concept of CGA (cryptographically generated address), but they can not hide their identities easily. The protocol is modified from DSR (dynamic source routing) to support secure routing. The neighbor discovery and domain name registration in IPv6 are incorporated and enhanced with security functions. The protocol is characterized by the following features: (i) it is designed based on IPv6, (ii) relying on a DNS server, it allows bootstrapping a MANET with little pre-configuration overhead, so network formation is light-weight, and (iii) it is able to resist a variety of security attacks

    Multi-Slot Allocation Protocols for Massive IoT Devices with Small-Size Uploading Data

    Get PDF
    The emergence of Internet of Things applications introduces new challenges such as massive connectivity and small data transmission. In traditional data transmission protocols, an ID (i.e., IP address or MAC address) is usually included in a packet so that its receiver is able to know who sent the packet. However, this introduces the big head-small body problem for light payload. To address this problem, the Hint protocols have been proposed. The main idea is to 'encode' information in a tiny broadcast Hint message that allows devices to 'decode' their transmission slots. Thus, it can significantly reduce transmission and contention overheads. In this letter, we extend eHint to support multi-slot data transmissions. Several efficient protocols are proposed. Our simulation results validate that the protocols can significantly increase the number of successfully transmitted devices, channel utilization, and payload of transmitted devices compared with eHint

    How to Reduce Unexpected eMBMS Session Disconnection: Design and Performance Analysis

    Get PDF
    In 3GPP eMBMS, sometimes sessions will be disconnected unexpectedly due to the miss of session keys. Although rekeying can prevent old users from getting multicast data, it also causes authorized users to miss subsequent data if they miss the key update messages. Thus, re-authentication is needed to obtain lost keys from KMM. We point out this problem in our previous work 1. In this paper, we further propose a new KeySet algorithm, which can pre-issue a number of keys to users when they join eMBMS. The advantage is that a user can still decode multicast data even if it misses some key updates tentatively. However, the cost is that allowing some old users to freely enjoying multicast for some time. In this paper, we quantify the tradeoff and derive the optimal case

    A Hint-Based Random Access Protocol for mMTC in 5G Mobile Network

    Get PDF
    With the increasing popularity of machine-type communication (MTC) devices, several new challenges are encountered by the legacy long term evolution (LTE) system. One critical issue is that a massive number of MTC devices trying to conduct random access procedures may cause significant collisions and long delays. In this work, we present a new random access mechanism by splitting the contention-based preambles in LTE into two logically disjoint parts, one for the user equipment (UE) being paged and the other for the UEs not being paged. Since the IDs of paged UEs are known by the base station, a novel hash-based random access, which we call hint, is possible. The main idea is to pre-allocate preambles to paged UEs in a contention-free manner and confines non-paged UEs to contend in a separate region. We further build a mathematical model to find the optimal ratio of pre-allocated preambles. Extensive simulations are conducted to validate our results

    Give me a hint: An ID-free small data transmission protocol for dense IoT devices

    Get PDF
    IoT (Internet of Things) has attracted a lot of attention recently. IoT devices need to report their data or status to base stations at various frequencies. The IoT communications observed by a base station normally exhibit the following characteristics: (1) massively connected, (2) lightly loaded per packet, and (3) periodical or at least mostly predictable. The current design principals of communication networks, when applied to IoT scenarios, however, do not fit well to these requirements. For example, an IPv6 address is 128 bits, which is much longer than a 16-bit temperature report. Also, contending to send a small packet is not cost-effective. In this work, we propose a novel framework, which is slot-based, schedule-oriented, and identity-free for uploading IoT devices' data. We show that it fits very well for IoT applications. The main idea is to bundle time slots with certain hashing functions of device IDs, thus significantly reducing transmission overheads, including device IDs and contention overheads. The framework is applicable from small-scale body-area (wearable) networks to large-scale massively connected IoT networks. Our simulation results verify that this framework is very effective for IoT small data uploading

    Design and Analysis of the Key Management Mechanism in Evolved Multimedia Broadcast/Multicast Service

    Get PDF
    3GPP introduced the key management mechanism (KMM) in evolved multimedia broadcast/multicast service (eMBMS) to provide forward security and backward security for multicast contents. In this paper, we point out that KMM may lead to frequent rekeying and re-authentication issues due to eMBMS's characteristics: 1) massive group members; 2) dynamic group topology; and 3) unexpected wireless disconnections. Such issues expose extra load for both user equipment (UE) terminals and mobile operators. It seems prolonging the rekeying interval is an intuitive solution to minimizing the impact of the issues. However, a long rekeying interval is not considered the best operational solution due to revenue loss of content providers. This paper quantifies the tradeoff between the load of the UEs and the operators as well as the revenue loss of the content providers. Moreover, we emphasize how essential this rekeying interval has impacts on the problems. Using our proposed tradeoff model, the operators can specify a suitable rekeying interval to best balance the interest between the above three parties. The tradeoff model is validated by extensive simulations and is demonstrated to be an effective approach for the tradeoff analysis and optimization on eMBMS

    eHint: An Efficient Protocol for Uploading Small-Size IoT Data

    Get PDF
    IoT (Internet of Things) has attracted a lot of attention recently. IoT devices need to report their data or status to base stations at various frequencies. The IoT communications observed by a base station normally exhibit the following characteristics: (1) massively connected, (2) lightly loaded per packet, and (3) periodical or at least mostly predictable. The current design principals of communication networks, when applied to IoT scenarios, however, do not fit well to these requirements. When a large number of devices contend to send small packets, the signaling overhead is not cost-effective. To address this problem, our previous work [1] proposes the Hint protocol, which is slot-based and schedule- oriented for uploading IoT devices' data. In this work, we extend [1] to support data transmissions for multiple resource blocks. We assume that the uplink payloads from IoT devices are small, each taking very few slots (or resource blocks), but devices are massive. The main idea is to "encode" information in a tiny broadcast that allows each device to "decode" its transmission slots, thus significantly reducing transmission overheads and contention overheads. Our simulation results verify that the protocol can significantly increase channel utilization compared with traditional schemes
    • …
    corecore