Change search
Refine search result
1 - 26 of 26
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Amadeo, Marcia
    et al.
    Universita Mediterranea di Reggio Calabria.
    Campolo, Claudia
    Universita Mediterranea di Reggio Calabria. Telecommunications.
    Quevedo, Jose
    Universidade de Aveiro, Inst Telecomunicacoes.
    Corujo, Daniel
    Universidade de Aveiro, Inst Telecomunicacoes.
    Molinaro, Antonella
    Universita Mediterranea di Reggio Calabria. Telecommunications.
    Iera, Antonio
    Universita Mediterranea di Reggio Calabria.
    Aguiar, Rui L.
    Universidade de Aveiro, Inst Telecomunicacoes.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Information-Centric Networking for the Internet of Things: Challenges and Opportunities2016In: IEEE Network, ISSN 0890-8044, E-ISSN 1558-156X, Vol. 30, no 2, p. 92-100, article id 7437030Article in journal (Refereed)
    Abstract [en]

    In view of evolving the Internet infrastructure, ICN is promoting a communication model that is fundamentally different from the traditional IP address-centric model. The ICN approach consists of the retrieval of content by (unique) names, regardless of origin server location (i.e., IP address), application, and distribution channel, thus enabling in-network caching/replication and content-based security. The expected benefits in terms of improved data dissemination efficiency and robustness in challenging communication scenarios indicate the high potential of ICN as an innovative networking paradigm in the IoT domain. IoT is a challenging environment, mainly due to the high number of heterogeneous and potentially constrained networked devices, and unique and heavy traffic patterns. The application of ICN principles in such a context opens new opportunities, while requiring careful design choices. This article critically discusses potential ways toward this goal by surveying the current literature after presenting several possible motivations for the introduction of ICN in the context of IoT. Major challenges and opportunities are also highlighted, serving as guidelines for progress beyond the state of the art in this timely and increasingly relevant topic.

  • 2.
    Aslam, Muhammad Shehryar
    et al.
    National University of Sciences and Technology (NUST), Pakistan.
    Khan, Alishba
    National University of Sciences and Technology (NUST), Pakistan.
    Atif, Abeera
    National University of Sciences and Technology (NUST), Pakistan.
    Hassan, Syed Ali
    National University of Sciences and Technology (NUST), Pakistan.
    Mahmood, Aamir
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Qureshi, Hassaan Khaliq
    National University of Sciences and Technology (NUST), Pakistan.
    Gidlund, Mikael
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Exploring Multi-Hop LoRa for Green Smart Cities2019In: IEEE Network, ISSN 0890-8044, E-ISSN 1558-156XArticle in journal (Refereed)
    Abstract [en]

    With the growing popularity of Internet-of-Things (IoT)-based smart city applications, various long-range and low-power wireless connectivity solutions are under rigorous research. LoRa is one such solution that works in the sub-GHz unlicensed spectrum and promises to provide long-range communication with minimal energy consumption. However, the conventional LoRa networks are single-hop, with the end devices connected to a central gateway through a direct link, which may be subject to large path loss and hence render low connectivity and coverage. This article motivates the use of multi-hop LoRa topologies to enable energy-efficient connectivity in smart city applications. We present a case study that experimentally evaluates and compares single-hop and multi-hop LoRa topologies in terms of range extension and energy efficiency by evaluating packet reception ratio (PRR) for various source to destination distances, spreading factors (SFs), and transmission powers. The results highlight that a multi-hop LoRa network configuration can save significant energy and enhance coverage. For instance, it is shown that to achieve a 90% PRR, a two-hop network provides 50% energy savings as compared to a single-hop network while increasing 35% coverage at a particular SF. In the end, we discuss open challenges in multi-hop LoRa deployment and optimization.

  • 3.
    Bohge, Mathias
    et al.
    TU Berlin.
    Gross, James
    Telecommunications Networks Group (TKN), Technical University Berlin.
    Meyer, Michael
    Ericsson Research.
    Wolisz, Adam
    TU Berlin.
    Dynamic Resource Allocation in OFDM Systems: An Overview of Cross-Layer Optimization Principles and Techniques2007In: IEEE Network, ISSN 0890-8044, E-ISSN 1558-156X, Vol. 21, no 1, p. 53-59Article in journal (Refereed)
    Abstract [en]

    Recently, a lot of research effort has been spent on cross-layer system design. It has been shown that cross-layer mechanisms (i.e., policies) potentially provide significant performance gains for various systems. In this article we review several aspects of cross-layer system optimization regarding wireless OFDM systems. We discuss basic optimization models and present selected heuristic approaches realizing cross-layer policies by means of dynamic resource allocation. Two specific areas are treated separately: models and dynamic approaches for single transmitter/receiver pairs (i.e., a point-to-point communication scenario) as well as models and approaches for point-to-multipoint communication scenarios (e.g., the downlink of a wireless cell). This article provides basic knowledge in order to investigate future OFDM cross-layer-optimization issues.

  • 4. Csaszar, Andras
    et al.
    Enyedi, Gabor
    Retveri, Gabor
    Hidell, Markus
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Sjödin, Peter
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Converging the evolution of router architectures and IP networks2007In: IEEE Network, ISSN 0890-8044, E-ISSN 1558-156X, Vol. 21, no 4, p. 8-14Article in journal (Refereed)
    Abstract [en]

    Although IP is widely recognized as the platform for next-generation converged networks, unfortunately, it is heavily burdened by its heritage of almost 30 years. Nowadays, network operators must devote significant resources to perform essential tasks, such as traffic engineering, policy enforcement, and security. In this article, we argue that one of the principal reasons for this is the way control and forwarding planes are interspersed in IP networks today. We review the architectural. developments that led to the current situation, and we reason that centralization of network control functionality can constitute a solution to the pressing problems of the contemporary Internet.

  • 5.
    Duchamp, Daniel J.
    et al.
    Columbia University.
    Feiner, Steven K.
    Columbia University.
    Maguire Jr., Gerald Q.
    Columbia University, Department of Computer Science.
    Software technology for wireless mobile computing1991In: IEEE Network, ISSN 0890-8044, E-ISSN 1558-156X, Vol. 5, no 6, p. 12-18Article in journal (Refereed)
    Abstract [en]

    Some of the possibilities and requirements for mobile computing on wireless local area networks (LANs) are discussed from the systems software viewpoint. The design of the Student Electronic Notebook (SEN) is sketched to provide a partial catalog of problems in building a real system for wireless mobile computing. This project was initiated to investigate the potential of wireless mobile computing to reshape education. Some of the key directions for research in software technology for wireless, mobile computing are examined. Some of the authors' experience with wireless LANs is related.

  • 6. Fiedler, Markus
    et al.
    Hossfeld, Tobias
    Tran-Gia, Phuoc
    A generic quantitative relationship between Quality of Experience and Quality of Service2010In: IEEE Network, ISSN 0890-8044, E-ISSN 1558-156X, Vol. 24, no 2, p. 36-41Article in journal (Refereed)
    Abstract [en]

    Quality of Experience (QoE) ties together user perception, experience and expectations to application and network performance, typically expressed by Quality of Service (QoS) parameters. Quantitative relationships between QoE and QoS are required in order to be able to build effective QoE control mechanisms onto measurable QoS parameters. On this background, this paper proposes a generic formula in which QoE and QoS parameters are connected through an exponential relationship, called IQX hypothesis. The formula relates changes of QoE with respect to QoS to the current level of QoE, is simple to match, and its limit behaviours are straighforward to interpret. It validates the IQX hypothesis for streaming services, where QoE in terms of Mean Opinion Scores (MOS) is expressed as functions of loss and reordering ratio, the latter of which is caused by jitter. For web surfing as the second application area, matchings provided by the IQX hypothesis are shown to outperform previously published logarithmic functions. We conclude that the IQX hypothesis is a strong candidate to be taken into account when deriving relationships between QoE and QoS parameters.

  • 7. Gomez-Barquero, David
    et al.
    Cardona, Narcis
    Bria, Aurelian
    Zander, Jens
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Affordable mobile TV services in hybrid cellular and DVB-H systems2007In: IEEE Network, ISSN 0890-8044, E-ISSN 1558-156X, Vol. 21, no 2, p. 34-40Article in journal (Refereed)
    Abstract [en]

    Mobile TV services are expected to become a key application in future wireless networks. The recently proposed terrestrial digital broadcast technology, DVB-H, especially designed for mobile services, is regarded as a powerful alternative to the 3G cellular networks that already offer these services but on a point-to-point basis. Unfortunately, the cost of supporting real-time streaming and full area coverage seems to be very high compared to fixed TV services. In this article we discuss hybrid IP datacast DVB-H and 3G systems as a possible solution for providing affordable network infrastructure and services. Our approach is DVB-H centric. The 3G cellular system plays the role of providing interactivity, error reporting, and repair for the DVB-H broadcast channel. To enable an easy and efficient interworking of DVB-H and 3G, we employ forward error correction at the application layer with digital fountain coding. The main way to provide, lower cost services is to avoid full DVB-H area coverage from the beginning and to perform an incremental DVB-H network deployment that follows the user demand. In this direction, to hide the discontinuity in coverage from the perception of users, we propose to take advantage of the bursty character of DVB-H transmissions and the mobility of users. This is possible by sending additional parity data, either with the DVB-H or the cellular network, in the time intervals between original service bursts. We evaluate the potential DVB-H infrastructure cost savings determined by transmitting additional parity data in DVB-H when targeting vehicular users. The implications of delivering parity data through the cellular network also are discussed. The numerical investigations show a potential for significant cost savings compared with the traditional approaches.

  • 8. Gustavsson, Eva
    et al.
    Karlsson, Gunnar
    RISE - Research Institutes of Sweden, ICT, SICS.
    A literature survey on traffic dispersion1997In: IEEE Network, ISSN 0890-8044, E-ISSN 1558-156X, Vol. 11, no 2, p. 28-36Article in journal (Refereed)
  • 9.
    Karlsson, Gunnar
    et al.
    KTH, School of Electrical Engineering (EES), Communication Networks.
    Más, Ignacio
    KTH, School of Electrical Engineering (EES), Communication Networks.
    Quality of Service and the End-to-End argument2007In: IEEE Network, ISSN 0890-8044, E-ISSN 1558-156X, Vol. 21, no 6, p. 16-21Article in journal (Refereed)
    Abstract [en]

    Audio-visual services are now commonly used on the Internet. Many of them are based on batch downloading of contents for later replay. Real-time interactive and streaming services are now rapidly becoming popular. These services would benefit from quality of service if it were widely provided. The purpose of this article is to show how QoS solutions may be introduced incrementally. Quality is obtained by means of a probe-based admission control that can be exerted outside the network. The introduction of QoS starts from self-admission control in the application layer, followed by transport layer service differentiation. These two steps do not require any change to the network. If motivated, scheduling for service class separation in the network may be added. We show by proof of concept how QoS may be provided in agreement with the end-to-end argument. The three steps of our proposal are compared and discussed with respect to the possibility of deployment.

  • 10.
    Kim, Seong-Lyun
    et al.
    KTH.
    Wu, Dapeng Oliver
    Schilling, Klaus
    Machine and Robotic Networking2012In: IEEE Network, ISSN 0890-8044, E-ISSN 1558-156X, Vol. 26, no 3, p. 4-5Article in journal (Other academic)
  • 11.
    Kumar, Neeraj
    et al.
    Thapar University, Patiala, Punjab, India.
    Zeadally, Sherali
    University of Kentucky, Lexington, Kentucky, United States.
    Chilamkurti, Naveen
    La Trobe University, Melbourne, Victoria, Australia.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Performance Analysis of Bayesian Coalition Game-Based Energy-Aware Virtual Machine Migration in Vehicular Mobile Cloud2015In: IEEE Network, ISSN 0890-8044, E-ISSN 1558-156X, Vol. 29, no 2, p. 62-69Article in journal (Refereed)
    Abstract [en]

    To provide computing and communication services to mobile clients, vehicular mobile cloud computing has gained lot of attention in recent times. However, one of the biggest challenges for the smooth execution of these services in this environment is the intelligent usage of VMs which may be overloaded due to numerous requests from mobile clients such as vehicles and mobile devices to access these services. However, poor utilization of VMs in this environment causes a lot of energy to be wasted. To address this issue, we propose Bayesian coalition game as-aservice for intelligent context-switching of VMs to support the above defined services in order to reduce the energy consumption, so that clients can execute their services without a performance degradation. In the proposed scheme, we have used the concepts of learning automata (LA) and game theory in which LA are assumed as the players such that each player has an individual payoff based upon the energy consumption and load on the VM. Players interact with the stochastic environment for taking action such as the selection of appropriate VMs and based upon the feedback received from the environment, they update their action probability vector. The performance of the proposed scheme is evaluated by using various performance evaluation metrics such as context-switching delay, overhead generated, execution time, and energy consumption. The results obtained show that the proposed scheme performs well with respect to the aforementioned performance metrics. Specifically, using the proposed scheme there is a reduction of 10 percent in energy consumption, 12 percent in network delay, 5 percent in overhead generation, and 10 percent in execution time. © 1986-2012 IEEE.

  • 12. Liu, Qiang
    et al.
    Hu, Xiping
    Ngai, Edith
    Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computer Systems.
    Liang, Min
    Leung, Victor C. M.
    Cai, Zhiping
    Yin, Jianping
    A security patch addressing bandwidth request vulnerabilities in the IEEE 802.16 standard2016In: IEEE Network, ISSN 0890-8044, E-ISSN 1558-156X, Vol. 30, no 5, p. 26-34Article in journal (Refereed)
  • 13.
    Lyamin, Nikita
    et al.
    Halmstad University, Sweden.
    Kleyko, Denis
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Delooz, Quentin
    University of Liège, Belgium.
    Vinel, Alexey
    Halmstad University, Sweden.
    AI-Based Malicious Network Traffic Detection in VANETs2018In: IEEE Network, ISSN 0890-8044, E-ISSN 1558-156X, Vol. 32, no 6, p. 15-21Article in journal (Refereed)
    Abstract [en]

    Inherent unreliability of wireless communications may have crucial consequences when safety-critical C-ITS applications enabled by VANETs are concerned. Although natural sources of packet losses in VANETs such as network traffic congestion are handled by decentralized congestion control (DCC), losses caused by malicious interference need to be controlled too. For example, jamming DoS attacks on CAMs may endanger vehicular safety, and first and foremost are to be detected in real time. Our first goal is to discuss key literature on jamming modeling in VANETs and revisit some existing detection methods. Our second goal is to present and evaluate our own recent results on how to address the real-time jamming detection problem in V2X safety-critical scenarios with the use of AI. We conclude that our hybrid jamming detector, which combines statistical network traffic analysis with data mining methods, allows the achievement of acceptable performance even when random jitter accompanies the generation of CAMs, which complicates the analysis of the reasons for their losses in VANETs. The use case of the study is a challenging platooning C-ITS application, where V2X-enabled vehicles move together at highway speeds with short inter-vehicle gaps.

  • 14.
    Lyamin, Nikita
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Kleyko, Denis
    Luleå University of Technology, Luleå, Sweden.
    Delooz, Quentin
    University of Liège, Liège, Belgium.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    AI-Based Malicious Network Traffic Detection in VANETs2018In: IEEE Network, ISSN 0890-8044, E-ISSN 1558-156X, Vol. 32, no 6, p. 15-21Article in journal (Refereed)
    Abstract [en]

    Inherent unreliability of wireless communications may have crucial consequences when safety-critical C-ITS applications enabled by VANETs are concerned. Although natural sources of packet losses in VANETs such as network traffic congestion are handled by decentralized congestion control (DCC), losses caused by malicious interference need to be controlled too. For example, jamming DoS attacks on CAMs may endanger vehicular safety, and first and foremost are to be detected in real time. Our first goal is to discuss key literature on jamming modeling in VANETs and revisit some existing detection methods. Our second goal is to present and evaluate our own recent results on how to address the real-time jamming detection problem in V2X safety-critical scenarios with the use of AI. We conclude that our hybrid jamming detector, which combines statistical network traffic analysis with data mining methods, allows the achievement of acceptable performance even when random jitter accompanies the generation of CAMs, which complicates the analysis of the reasons for their losses in VANETs. The use case of the study is a challenging platooning C-ITS application, where V2X-enabled vehicles move together at highway speeds with short inter-vehicle gaps.

  • 15.
    Lyu, Xinchen
    et al.
    Beijing University of Posts and Telecommunications, Beijing, China.
    Tian, Hui
    Beijing University of Posts and Telecommunications, Beijing, China.
    Jiang, Li
    Guangdong University of Technology, Guangzhou, China.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Maharjan, Sabita
    Simula Research Laboratory, Oslo, Norway & University of Oslo, Oslo, Norway.
    Gjessing, Stein
    Simula Research Laboratory, Oslo, Norway & University of Oslo, Oslo, Norway.
    Zhang, Yan
    University of Oslo, Oslo, Norway.
    Selective Offloading in Mobile Edge Computing for the Green Internet of Things2018In: IEEE Network, ISSN 0890-8044, E-ISSN 1558-156X, Vol. 32, no 1, p. 54-60Article in journal (Refereed)
    Abstract [en]

    Mobile edge computing provides the radio access networks with cloud computing capabilities to fulfill the requirements of the Internet of Things services such as high reliability and low latency. Offloading services to edge servers can alleviate the storage and computing limitations and prolong the lifetimes of the IoT devices. However, offloading in MEC faces scalability problems due to the massive number of IoT devices. In this article, we present a new integration architecture of the cloud, MEC, and IoT, and propose a lightweight request and admission framework to resolve the scalability problem. Without coordination among devices, the proposed framework can be operated at the IoT devices and computing servers separately, by encapsulating latency requirements in offloading requests. Then a selective offloading scheme is designed to minimize the energy consumption of devices, where the signaling overhead can be further reduced by enabling the devices to be self-nominated or self-denied for offloading. Simulation results show that our proposed selective offloading scheme can satisfy the latency requirements of different services and reduce the energy consumption of IoT devices. © 2018 IEEE 

  • 16.
    Ma, Z.
    et al.
    Beijing University of Posts and Telecommunications, China.
    Xie, J.
    Beijing University of Posts and Telecommunications, China.
    Li, Hailong
    Mälardalen University, School of Business, Society and Engineering, Future Energy Center. Tianjin University of Commerce, China.
    Sun, Q.
    Shandong University, China.
    Si, Z.
    Beijing University of Posts and Telecommunications, China.
    Zhang, J.
    Beijing University of Posts and Telecommunications, China.
    Guo, J.
    Beijing University of Posts and Telecommunications, China.
    The role of data analysis in the development of intelligent energy networks2017In: IEEE Network, ISSN 0890-8044, E-ISSN 1558-156X, Vol. 31, no 5, p. 88-95, article id 8053484Article in journal (Refereed)
    Abstract [en]

    Data analysis plays an important role in the development of intelligent energy networks (IENs). This article reviews and discusses the application of data analysis methods for energy big data. The installation of smart energy meters has provided a huge volume of data at different time resolutions, suggesting data analysis is required for clustering, demand forecasting, energy generation optimization, energy pricing, monitoring and diagnostics. The currently adopted data analysis technologies for IENs include pattern recognition, machine learning, data mining, statistics methods, and so on. However, existing methods for data analysis cannot fully meet the requirements for processing the big data produced by IENs, therefore more comprehensive data analysis methods are needed to handle the increasing amount of data and to mine more valuable information.

  • 17.
    Mahanti, Aniket
    et al.
    University of Calgary, Canada.
    Carlsson, Niklas
    Linköping University, Department of Computer and Information Science, Database and information techniques. Linköping University, The Institute of Technology.
    Mahanti, Anirban
    NICTA, Eveleigh, New South Wales, Australia.
    Arlitt, Martin
    University of Calgary, Canada.
    Williamson, Carey
    University of Calgary, Canada.
    A Tale of the Tails: Power-laws in Internet Measurements2013In: IEEE Network, ISSN 0890-8044, E-ISSN 1558-156X, Vol. 27, no 1, p. 59-64Article in journal (Refereed)
    Abstract [en]

    Power-laws are ubiquitous in the Internet and its applications. In this survey article, we provide a review of such properties in Internet measurements. First, we give definitions of power-law distributions, such as Pareto and Zipf, while also reviewing heavy tails and long tails, and discussing a well-known model for understanding power-law behaviour in computer networks. Second, we present several examples of Internet workload properties exhibiting power-law behaviour. Finally, we explore several implications of power-law in computer networks. Using examples from past and present, we review how researchers have studied and exploited power-law properties. We observe that despite the challenges posed, power-laws have been effectively leveraged by researchers to improve the design and performance of Internet-based systems.

  • 18. Saha, D.
    et al.
    Mukherjee, Amitava
    KTH, Superseded Departments, Microelectronics and Information Technology, IMIT. IBM Global Services, Calcutta, India .
    Misra, I. S.
    Chakraborty, M.
    Mobility support in IP: A survey of related protocols2004In: IEEE Network, ISSN 0890-8044, E-ISSN 1558-156X, Vol. 18, no 6, p. 34-40Article in journal (Refereed)
    Abstract [en]

    This article presents an overview of a set of IP-based mobility protocols - Mobile IP, HAWAII, Cellular IP, Hierarchical MIP, TeleMIP, Dynamic Mobility Agent, and Terminal Independent MIP - that will play an important role in the forthcoming convergence of IP and legacy wireless networks. A comparative analysis with respect to system parameters such as location update, handoff latency and signaling overhead exposes their ability in managing micro/macro/global-level mobility. We use this observation to relate their features against a number of key design issues identified for seamless IP-based mobility as envisioned for future 4G networks.

  • 19.
    Shames, Iman
    et al.
    KTH, School of Electrical Engineering (EES), Automatic Control. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.
    Teixeira, André
    KTH, School of Electrical Engineering (EES), Automatic Control. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.
    Sandberg, Henrik
    KTH, School of Electrical Engineering (EES), Automatic Control. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.
    Johansson, Karl Henrik
    KTH, School of Electrical Engineering (EES), Automatic Control. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.
    Agents Misbehaving in a Network: a Vice or a Virtue?2012In: IEEE Network, ISSN 0890-8044, E-ISSN 1558-156X, Vol. 26, no 3, p. 35-40Article in journal (Refereed)
    Abstract [en]

    Misbehaviors among the agents in a network might be intentional or unintentional, they might cause a system-wide failure or they might improve the performance or even enable us to achieve an objective. In this article we consider examples of these possible scenarios. First, we argue the necessity of monitoring the agents in a network to detect if they are misbehaving or not and outline a distributed method in which each agent monitors its neighbors for any sign of misbehavior. Later, we focus on solving the problem of distributed leader selection via forcing the agents to temporarily misbehave, and introduce an algorithm that enables the agents in a network to select their leader without any interference from the outside of the network.

  • 20. Shea, Ryan
    et al.
    Liu, Jiangchuan
    Ngai, Edith C.-H.
    Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computer Systems.
    Cui, Yong
    Cloud Gaming: Architecture and Performance2013In: IEEE Network, ISSN 0890-8044, E-ISSN 1558-156X, Vol. 27, no 4, p. 16-21Article in journal (Refereed)
  • 21.
    Shokri-Ghadikolaei, Hossein
    et al.
    KTH, School of Electrical Engineering (EES), Automatic Control. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.
    Fischione, Carlo
    KTH, School of Electrical Engineering (EES), Automatic Control.
    Popovski, Petar
    Aalborg University, Denmark.
    Zorzi, Michele
    Design aspects of short range millimeter wave networks: A MAC layer perspective2016In: IEEE Network, ISSN 0890-8044, E-ISSN 1558-156X, Vol. 30, no 3, p. 88-96Article in journal (Refereed)
    Abstract [en]

    Increased density of wireless devices, ever growing demands for extremely high data rate, and spectrum scarcity at microwave bands make the millimeter wave (mmWave) frequencies an important player in future wireless networks. However, mmWave communication systems exhibit severe attenuation, blockage, deafness, and may need microwave networks for coordination and fall-back support. To compensate for high attenuation, mmWave systems exploit highly directional operation, which in turn substantially reduces the interference footprint. The significant differences between mmWave networks and legacy communication technologies challenge the classical design approaches, especially at the medium access control (MAC) layer, which has received comparatively less attention than PHY and propagation issues in the literature so far. In this paper, the MAC layer design aspects of shortrange mmWave networks are discussed. In particular, we explain why current mmWave standards fail to fully exploitthe potential advantages of short range mmWave technology, and argue for the necessity of new collision-awarehybrid resource allocation frameworks with on-demand control messages, the advantages of a collision notification message, and the potential of multihop communication to provide reliable mmWave connections.

  • 22. Verscheure, Oliver
    et al.
    Garcia, Xavier
    Karlsson, Gunnar
    RISE - Research Institutes of Sweden, ICT, SICS.
    Hubaux, Jean-Pierre
    User-oriented QoS in packet video delivery1998In: IEEE Network, ISSN 0890-8044, E-ISSN 1558-156X, Vol. 12, no 6, p. 12-21Article in journal (Refereed)
  • 23.
    Vondra, Michal
    et al.
    Czech Tech Univ, Prague, Czech Republic..
    Ozger, Mustafa
    KTH, School of Electrical Engineering and Computer Science (EECS), Communication Systems, CoS, Radio Systems Laboratory (RS Lab).
    Schupke, Dominic
    Airbus, Res & Innovat Wireless Commun, Munich, Germany..
    Cavdar, Cicek
    KTH, School of Electrical Engineering and Computer Science (EECS), Communication Systems, CoS, Radio Systems Laboratory (RS Lab).
    Integration of Satellite and Aerial Communications for Heterogeneous Flying Vehicles2018In: IEEE Network, ISSN 0890-8044, E-ISSN 1558-156X, Vol. 32, no 5, p. 62-69Article in journal (Refereed)
    Abstract [en]

    The rising number of airplanes and UAVs requiring connectivity in the sky puts high demands on all types of networks. In areas without DA2GC coverage, such as sea or oceans, the only option is SC. However, the capacity of SC is limited and insufficient in some cases. Therefore, an extension of DA2GC by A2AC and integration of A2AC and SC is a promising solution to improve available capacity. The main aim of this article is to evaluate limits of SC and A2AC in terms of maximum available capacity and maximum range. The results show that A2AC through DA2GC backhauling is able to overcome capacity available by SC on certain conditions while flying close to the mainland. Integration of A2AC and SC can significantly improve data rate available for UAVs and airplanes, especially if the sky cannot be covered by DA2GC only. Our results show that A2AC can provide capacity up to 93 Mb/s, and it can even exceed the capacity of SC when DA2GC and A2AC distances are short. When SC is overloaded, A2AC can be used instead to provide airplanes with capacity of 37 Mb/s up to 432 km DA2GC distance and 340 km A2AC distance. Besides the evaluation of both networks, the article also summarizes and discusses potential challenges and open issues of integration that need to be considered on the way to successful cooperation of both networks.

  • 24.
    Wang, Kun
    et al.
    Nanjing University of Posts and Telecommunications, Nanjing, China.
    Du, Miao
    Nanjing University of Posts and Telecommunications, Nanjing, China.
    Sun, Yanfei
    Nanjing University of Posts and Telecommunications, Nanjing, China.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Zhang, Yan
    University of Oslo, Oslo, Norway & Simula Research Laboratory, Fornebu, Norway.
    Attack Detection and Distributed Forensics in Machine-to-Machine Networks2016In: IEEE Network, ISSN 0890-8044, E-ISSN 1558-156X, Vol. 30, no 6, p. 49-55Article in journal (Refereed)
    Abstract [en]

    The advanced idea of machine-to-machine technology has attracted a new period of network revolution, evolving into a method to monitor and control global industrial user assets, machines, and the production process. M2M networks are considered to be the intelligent connection and communication between machines. However, the security issues have been further amplified with the development of M2M networks. Consequently, it is essential to pour attention into attack detection and forensics problems in M2M networks. This article puts forward the hybrid attack detection and forensics model in M2M networks. It contains two modules: the attack detection module and the forensics analysis module. In addition, we present a distributed anti-honeypot-based forensics strategy to cope with DDoS attacks in the forensics analysis module. Finally, we also discuss some challenges in M2M network security and forensics.

  • 25.
    Wang, Kun
    et al.
    Nanjing University of Posts and Telecommunications, Nanjing, China.
    Gu, Liqiu
    Nanjing University of Posts and Telecommunications, Nanjing, China.
    He, Xiaoming
    Nanjing University of Posts and Telecommunications, Nanjing, China.
    Guo, Song
    Hong Kong Polytechnic University, Hong Kong, Hong Kong.
    Sun, Yanfei
    Nanjing University of Posts and Telecommunications, Nanjing, China.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Shen, Jian
    Nanjing University of Information Science and Technology, Nanjing, China.
    Distributed Energy Management for Vehicle-to-Grid Networks2017In: IEEE Network, ISSN 0890-8044, E-ISSN 1558-156X, Vol. 31, no 2, p. 22-28Article in journal (Refereed)
    Abstract [en]

    Making full use of V2G services, EVs with batteries may assist the smart grid in alleviating peaks of energy consumption. Aiming to develop a systematic understanding of the interplay between smart grid and EVs, an architecture for the V2G networks with the EV aggregator is designed to maintain the balance between energy suppliers (the grid side) and consumers (the EV side). We propose a combined control and communication approach considering distributed features and vehicle preferences in order to ensure efficient energy transfer. In our model, the integrated communication and control unit can achieve realtime and intelligent management with the logic controller and collected data. On the consumers' side, we theoretically analyze how to satisfy the charging constraints that we incorporate in the form of willingness to pay, and propose a distributed framework to coordinate the energy delivery behaviors for satisfying service demands. Moreover, illustrative results indicate that the proposed approach can yield higher revenue than the conventional pricing mechanism in V2G networks.

  • 26.
    Wang, You
    et al.
    Institute for Network Sciences and Cyberspace, Tsinghua University.
    Bi, Jun
    Institute for Network Sciences and Cyberspace, Tsinghua University.
    Vasilakos, Athanasios
    University of Western Macedonia.
    An Identifier-Based Approach to Internet Mobility: A Survey2016In: IEEE Network, ISSN 0890-8044, E-ISSN 1558-156X, Vol. 30, no 1, p. 72-79Article in journal (Refereed)
1 - 26 of 26
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf