Change search
Refine search result
1234 51 - 100 of 190
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 51.
    Dorrell, David G.
    et al.
    University of Technology Sydney, Sydney, New South Wales, Australia.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Cao, Dongpu
    Cranfield University, Bedford, United Kingdom.
    Connected Vehicles – Advancements in Vehicular Technologies and Informatics2015In: IEEE transactions on industrial electronics (1982. Print), ISSN 0278-0046, E-ISSN 1557-9948, Vol. 62, no 12, p. 7824-7826, article id 7322333Article in journal (Refereed)
    Abstract [en]

    Vehicles are becoming increasingly more sophisticated and the technology being developed in them covers a number of areas. At the heart of these developments are often the communication, information and control systems. This is very much illustrated in this "Special Section on Connected Vehicles - Advancements in Vehicular Technologies and Informatics" of the IEEE Transactions on Industrial Electronics that we are pleased to present. The Special Section contains twelve papers related to automotive technology. Obviously there a range of areas covered from very high speed machines, that could be used for cooling fans in automotive fuel cells or scaled up for drive motors, to energy management and into various communications aspects of vehicular technology. © 1982-2012 IEEE.

  • 52.
    Díez Rodríguez, Victor
    et al.
    Halmstad University, School of Information Technology.
    Detournay, Jérôme
    Halmstad University, School of Information Technology.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Lyamin, Nikita
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    An Approach for Receiver-Side Awareness Control in Vehicular Ad Hoc Networks2018In: IEEE transactions on intelligent transportation systems (Print), ISSN 1524-9050, E-ISSN 1558-0016, Vol. 19, no 4, p. 1227-1236Article in journal (Refereed)
    Abstract [en]

    Vehicular Ad hoc networks (VANET) are a key element of cooperative intelligent transport systems. One of the challenges in VANETs is dealing with awareness and congestion due to the high amount of messages received from the vehicles in communication range. As VANETs are used in critical applications, congestion on the receiver side caused by the buffering of the packets is a safety hazard. In this paper, we propose a streamwise queuing system on the receiver side and show how it improves the timeliness of the messages received and maintains the awareness of the system in a congestion situation. © Copyright 2017 IEEE

  • 53.
    Evdokimova, Ekaterina
    et al.
    Department of Telecommunications and Information, Ghent University, Gent, Belgium.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES). Department of Electrical Engineering, Western Norway University of Applied Sciences, Bergen, Norway.
    Lyamin, Nikita
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Fiems, Dieter
    Department of Telecommunications and Information, Ghent University, Gent, Belgium.
    Internet Provisioning in VANETs: Performance Modeling of Drive-Thru Scenarios2019In: IEEE transactions on intelligent transportation systems (Print), ISSN 1524-9050, E-ISSN 1558-0016, p. 1-15Article in journal (Refereed)
    Abstract [en]

    Drive-thru-Internet is a scenario in cooperative intelligent transportation systems (C-ITSs), where a road-side unit (RSU) provides multimedia services to vehicles that pass by. Performance of the drive-thru-Internet depends on various factors, including data traffic intensity, vehicle traffic density, and radio-link quality within the coverage area of the RSU, and must be evaluated at the stage of system design in order to fulfill the quality-of-service requirements of the customers in C-ITS. In this paper, we present an analytical framework that models downlink traffic in a drive-thru-Internet scenario by means of a multidimensional Markov process: the packet arrivals in the RSU buffer constitute Poisson processes and the transmission times are exponentially distributed. Taking into account the state space explosion problem associated with multidimensional Markov processes, we use iterative perturbation techniques to calculate the stationary distribution of the Markov chain. Our numerical results reveal that the proposed approach yields accurate estimates of various performance metrics, such as the mean queue content and the mean packet delay for a wide range of workloads. © 2019 IEEE.

  • 54.
    Fiems, Dieter
    et al.
    Ghent University, Ghent, Belgium.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Connectivity Times in Vehicular Networks2018In: IEEE Communications Letters, ISSN 1089-7798, E-ISSN 1558-2558, Vol. 22, no 11, p. 2270-2273, article id 8444968Article in journal (Refereed)
    Abstract [en]

    We propose an analytical model that accurately captures the service advertisement and access mechanisms in IEEE 1609.4/IEEE 802.11p multi-channel vehicular networks where road-side units announce non-safety services to passing vehicles on a dedicated channel. For a drive-thru scenario, we calculate various performance measures including the service discovery probability, the mean time till discovery and the channel utilization. © 1997-2012 IEEE.

  • 55.
    Gao, Ruixia
    et al.
    School of Software, Dalian University of Technology, Dalian, China.
    Xia, Feng
    School of Software, Dalian University of Technology, Dalian, China.
    Wang, Linqiang
    School of Software, Dalian University of Technology, Dalian, China.
    Qiu, Tie
    School of Software, Dalian University of Technology, Dalian, China.
    Vinel, Alexey
    Department of Communications Engineering, Tampere University of Technology, Tampere, Finland.
    Performance analysis of non-beaconed IEEE 802.15.4 for high-confidence wireless communications2011In: 2011 Baltic Congress on Future Internet Communications (BCFIC Riga), Piscataway, N.J.: IEEE Press, 2011, p. 83-89Conference paper (Refereed)
  • 56.
    He, Debiao
    et al.
    Wuhan University, Wuhan, China & the State Key Laboratory of Cryptology, Beijing, China.
    Kumar, Neeraj
    Thapar University, Patiala, India.
    Wang, Huaqun
    Dalian Ocean University, Dalian, China.
    Wang, Lina
    Wuhan University, Wuhan, China.
    Raymond Choo, Kim-Kwang
    University of Texas at San Antonio, San Antonio, Texas, USA; University of South Australia, Adelaide, Australia & China University of Geosciences, Wuhan, China.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network2018In: IEEE Transactions on Dependable and Secure Computing, ISSN 1545-5971, E-ISSN 1941-0018, Vol. 15, no 4, p. 633-645Article in journal (Refereed)
    Abstract [en]

    With rapid developments of sensor, wireless and mobile communication technologies, Mobile Healthcare Social Networks (MHSNs) have emerged as a popular means of communication in healthcare services. Within MHSNs, patients can use their mobile devices to securely share their experiences, broaden their understanding of the illness or symptoms, form a supportive network, and transmit information (e.g. state of health and new symptoms) between users and other stake holders (e.g. medical center). Despite the benefits afforded by MHSNs, there are underlying security and privacy issues (e.g. due to the transmission of messages via a wireless channel). The handshake scheme is an important cryptographic mechanism, which can provide secure communication in MHSNs (e.g. anonymity and mutual authentication between users, such as patients). In this paper, we present a new framework for the handshake scheme in MHSNs, which is based on hierarchical identity-based cryptography. We then construct an efficient Cross-Domain HandShake (CDHS) scheme that allows symptoms-matching within MHSNs. For example, using the proposed CDHS scheme, two patients registered with different healthcare centers can achieve mutual authentication and generate a session key for future secure communications. We then prove the security of the scheme, and a comparative summary demonstrates that the proposed CDHS scheme requires fewer computation and lower communication costs. We also implement the proposed CDHS scheme and three related schemes in a proof of concept Android app to demonstrate utility of the scheme. Findings from the evaluations demonstrate that the proposed CDHS scheme achieves a reduction of 18.14% and 5.41% in computation cost and communication cost, in comparison to three other related handshake schemes. © 2016 IEEE. 

  • 57.
    He, Debiao
    et al.
    Wuhan University, Wuhan, China.
    Kumar, Neeraj
    Thapar University, Patiala, India.
    Zeadally, Sherali
    University of the District of Columbia, Lexington, Kentucky, USA.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Yang, Laurence T.
    St. Francis Xavier University, Antigonish, Canada.
    Efficient and Privacy-Preserving Data Aggregation Scheme for Smart Grid against Internal Adversaries2017In: IEEE Transactions on Smart Grid, ISSN 1949-3053, E-ISSN 1949-3061, Vol. 8, no 5, p. 2411-2419Article in journal (Refereed)
    Abstract [en]

    Privacy-Preserving Data Aggregation (P2DA) is an important basic building block that can protect consumer’s privacy in the smart grid environment because it could be used to prevent the extraction of the electricity consumption information of a specific consumer. Due to this important function, the P2DA scheme for the smart grid has attracted a lot of attention from both academic and industry researchers who have proposed many P2DA schemes for the smart grid in recent years. However, most of these P2DA schemes are not secure against internal attackers or cannot provide data integrity. Besides, their computation costs are not satisfactory because the bilinear pairing operation or the hash-to-point operation is performed at the smart meter’s side. To address the deficiencies of previous schemes, we propose a new P2DA scheme against internal attackers using Boneh-Goh-Nissim public key cryptography. The proposed P2DA scheme does not use bilinear pairing or hash-to-point operations making it more computationally efficient than previous P2DA schemes. We also show that the proposed P2DA scheme is provably secure and can meet various security requirements. © Copyright 2017 IEEE

  • 58.
    Hilt, Benoit
    et al.
    University of Haute Alsace, Colmar, France.
    Berbineau, MarionIFSTTAR, Villeneuve d’Ascq, France .Vinel, AlexeyHalmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).Pirovano, AlainENAC, Toulouse, France .
    Networking Simulation for Intelligent Transportation Systems: High Mobile Wireless Nodes2017Collection (editor) (Refereed)
    Abstract [en]

    This book studies the simulation of wireless networking in the domain of Intelligent Transportation Systems (ITS) involving aircraft, railway and vehicular communication. On this subject, particular focus is placed on effective communication channels, mobility modeling, multi-technology simulation and global ITS simulation frameworks.

    Networking Simulation for Intelligent Transportation Systems addresses the mixing of IEEE802.11p and LTE into a dedicated simulation environment as well as the links between ITS and IoT; aeronautical mobility and VHD Data Link (VDL) simulation; virtual co-simulation for railway communication and control-command; realistic channel simulation, mobility modeling and autonomic simulation for VANET and quality metrics for VANET.

    The authors intend for this book to be as useful as possible to the reader as they provide examples of methods and tools for running realistic and reliable simulations in the domain of communications for ITS.

  • 59.
    Hilt, Benoît
    et al.
    University of Haute Alsace, Mulhouse, Colmar, France.
    Berbineau, MarionFrench Institute of Science and Technology, Spatial Planning, Development, and Networks, Villeneuve d'Ascq, France.Vinel, AlexeyHalmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).Jonsson, MagnusHalmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).Pirovano, AlainÉcole Nationale de l’Aviation Civile, Toulouse, France.
    Communication Technologies for Vehicles: 14th International Workshop, Nets4Cars/Nets4Trains/Nets4Aircraft 2019, Colmar, France, May 16–17, 2019, Proceedings2019Conference proceedings (editor) (Refereed)
  • 60.
    Huang, Chung-Ming
    et al.
    Department of Computer Science and Information Engineering National Cheng Kung University, Tainan, Taiwan.
    Yang, Chia-Ching
    Department of Computer Science and Information Engineering National Cheng Kung University, Tainan, Taiwan.
    Hu, Chun-Ming
    Department of Computer Science and Information Engineering National Cheng Kung University, Tainan, Taiwan.
    Vinel, Alexey
    Department of Communications Engineering, Tampere University of Technology, Tampere, Finland.
    An open Telematics Service Providing Framework using the P2P-like paradigm based on the somecast protocol2011In: 2011 Baltic Congress on Future Internet and Communications, Piscataway, N.J.: IEEE Press, 2011, p. 198-205Conference paper (Refereed)
  • 61.
    Huang, Chung-Ming
    et al.
    Department of Computer Science and Information Engineering, National Cheng Kung University, Tainan, Taiwan.
    Yang Lin, Shih
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Jonsson, Magnus
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Proactive safety – cooperative collision warning for vehicles2015In: Clean Mobility and Intelligent Transport Systems / [ed] Michele Fiorini & Jia-Chin Lin, London: IET Digital Library, 2015, p. 117-134Chapter in book (Refereed)
    Abstract [en]

    Telematics is an interdisciplinary technology that combines telecommunications, vehicular technologies, road transportation, road safety, electrical engineering, and computer science to provide applications and services for the purpose of comfort and safety enhancement. From the timing point of view, the driving safety can be classified into two domains: (1) active safety and (2) passive safety. Passive safety systems are used to reduce damage and protect passengers and drivers when an accident occurs. Common passive safety systems include airbags, seatbelts, whiplash injury lessening systems, and energy absorbing steering column. Active safety systems are used to prevent accidents before they occur. An example of active safety system is the collision warning/avoidance system. It basically collects/detects neighboring vehicles' motion states to compute potential collision between vehicles. Based on future technology, cooperative active safety systems emerge. Vehicles can exchange their information between each other through wireless communication [1], for example, over a vehicular ad hoc network (VANET), for cooperative purposes such as collision warning/avoidance. In a project named smart intersection, a collision avoidance system based on the concept of active safety was developed by Ford and the US government [2]. The system collects a vehicle's information like Global Positioning System (GPS) coordinates, velocity, and heading and delivers it through wireless communication to other vehicles in order to prevent accidents and congestion before vehicles arrive to an intersection. To understand the details of cooperative collision warning (CCW), this chapter exposes main factors that affect the accuracy of CCW, challenges of CCW, communication techniques for cooperative safety, and collision prediction techniques. CCW systems are also introduced in detail. Moreover, we present some existing safety-related techniques and systems that are developed by automobile manufacturers. © The Institution of Engineering and Technology 2015

  • 62.
    Isento, João N.G.
    et al.
    University of Beira Interior, Covilhã, Portugal.
    Rodrigues, Joel J.P.C.
    University of Beira Interior, Covilhã, Portugal.
    Dias, João A.F.F.
    University of Beira Interior, Covilhã, Portugal.
    Paula, Maicke C.G.
    Department of Product Engineering, Fiat Automobile, Brazil.
    Vinel, Alexey
    Tampere University of Technology, Tampere, Finland .
    Vehicular Delay-Tolerant Networks? A Novel Solution for Vehicular Communications2013In: IEEE Intelligent Transportation Systems Magazine, ISSN 1939-1390, Vol. 5, no 4, p. 10-19Article in journal (Refereed)
    Abstract [en]

    Vehicular Delay-Tolerant Networks (VDTNs) is a breakthrough based DTN-based solution to provide vehicular communications under challenging scenarios characterized by long delays and sporadic connections. VDTN uses a store-carry-and-forward paradigm, inspirited from Delay Tolerant Networks, which allows forward bundles to asynchronously reach the destination hop by hop over traveling vehicles equipped with short-range Wi-Fi devices. The proposed VDTN architecture assumes out-of-band signaling with control and data planes separation. VDTNs also assume datagrams aggregation under the network layer in large size packets, called bundles, following an IP over VDTN approach. This paper presents VDTN networks focusing on their layered architecture, bundle aggregation and de-aggregation mechanisms, network protocols, scheduling and dropping policies, fragmentation mechanisms, and the created tools for VDTNs performance evaluation, demonstration, and validation. © 2009-2012 IEEE.

  • 63.
    Jonsson, Magnus
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Rak, JacekGdańsk University of Technology, Gdańsk, Poland.Somani, ArunIowa State University, Ames, USA.Papadimitriou, DimitriNokia Bell Labs, Antwerp, Belgium.Vinel, AlexeyHalmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Proceedings of 2016 8th International Workshop on Resilient Networks Design and Modeling (RNDM) 2016Conference proceedings (editor) (Refereed)
  • 64.
    Jonsson, Magnus
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Vinel, AlexeyHalmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).Bellalta, BorisPompeu Fabra University, Barcelona, Spain.Belyaev, EvgenyTampere University of Technology, Tampere, Finland.
    Multiple Access Communications: 7th International Workshop, MACOM 20142014Conference proceedings (editor) (Refereed)
  • 65.
    Jonsson, Magnus
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Vinel, AlexeyTempere University of Technology, Finland.Bellalta, BorisUniversitat Pompeu Fabra, Barcelona, Spain.Marina, NinoslavThe University of Information Science and Technology “St. Paul the Apostle”, Ohrid, Republic of Macedonia.Dimitrova, DesislavaUniversity of Bern, Switzerland.Fiems, DieterGhent University, Belgium.
    Multiple Access Communications: 6th International Workshop, MACOM 2013, Vilnius, Lithuania, December 16-17, 2013, Proceedings2013Conference proceedings (editor) (Refereed)
  • 66.
    Jonsson, Magnus
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Vinel, AlexeyHalmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).Bellalta, BorisUniversitat Pompeu Fabra, Barcelona, Catalonia, Spain.Tirkkonen, OlavAalto University, Espoo, Finland.
    Multiple Access Communications: 8th International Workshop, MACOM 2015, Helsinki, Finland, September 3-4, 2015, Proceedings2015Conference proceedings (editor) (Refereed)
  • 67.
    Kajackas, Algimantas
    et al.
    Vilnius Gediminas Technical University, Vilnius, Lithuania.
    Koucheryavy, YevgeniDepartment of Communications Engineering, Tampere University of Technology, Tampere, Finland.Loo, JonathanMiddlesex University, London, United Kingdom.Vinel, AlexeyDepartment of Communications Engineering, Tampere University of Technology, Tampere, Finland.Medeisis, ArturasVilnius Gediminas Technical University, Vilnius, Lithuania.Navakauskas, DaliusVilnius Gediminas Technical University, Vilnius, Lithuania.
    2012 2nd Baltic Congress on Future Internet Communications2012Conference proceedings (editor) (Refereed)
    Abstract [en]

    The following topics are dealt with: smart applications; next generation WLAN; broadband infrastructure; network performance; network security; user-centric solutions; wireless systems; Internet of things; smart spaces; analog integrated circuits; traffic analysis; SoC; routing; and protocols. © 2012 IEEE

  • 68.
    Kassab, Mohamed
    et al.
    HANA Laboratory, Manouba, Tunisia.
    Berbineau, MarionIFSTTAR, Villeneuve d’Ascq, France.Vinel, AlexeyHalmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).Jonsson, MagnusHalmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).Garcia, FabienENAC, Toulouse, France.Soler, JoséTechnical University of Denmark, Kgs. Lyngby, Denmark.
    Communication Technologies for Vehicles: 8th International Workshop, Nets4Cars/Nets4Trains/Nets4Aircraft 2015, Sousse, Tunisia, May 6-8, 2015. Proceedings2015Conference proceedings (editor) (Refereed)
  • 69.
    Kaur, Kuljeet
    et al.
    Thapar University, Patiala, Punjab, India.
    Dua, Amit
    Thapar University, Patiala, Punjab, India.
    Jindal, Anish
    Thapar University, Patiala, Punjab, India.
    Kumar, Neeraj
    Thapar University, Patiala, Punjab, India.
    Singh, Mukesh
    Thapar University, Patiala, Punjab, India.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    A Novel Resource Reservation Scheme for Mobile PHEVs in V2G Environment using Game Theoretical Approach2015In: IEEE Transactions on Vehicular Technology, ISSN 0018-9545, E-ISSN 1939-9359, Vol. 64, no 12, p. 5653-5666Article in journal (Refereed)
    Abstract [en]

    With the widespread penetration of plug-in hybrid electric vehicles (PHEVs), the overall demand on micro-grids (MGs) may increase manifold in the near future. Unregulated power demands from PHEVs may increase the demand-supply gap at MG. Thus, in order to keep MGs stabilize, and cater the ever growing energy demands, there is a requirement of an intelligent solution to regulate, and manage PHEVs in vehicle-togrid (V2G) environment. Keeping in view the above issues, this paper proposes a novel scheme which aims to regulate PHEVs? charging, and discharging activities based on MGs? day-ahead load curves. These load curves are obtained by utilizing the existing load forecasting techniques such as-fuzzy logic (FL), and artificial neural networks (ANN). Efficient utilization of PHEVs according to these curves may play a vital role in flattening MG?s load profile. Thus, the proposed scheme works by reserving resources such as-time slots, and charging points for PHEVs during peak shaving, and valley filling. Different algorithms pertaining to resource reservation for PHEVs have also been designed. These algorithms employ the concepts of game theory, and 0/1 knapsack problem for supporting peak shaving, and valley filling respectively. Moreover, PHEVs are also utilized when there are transitions from valley filling to peak shaving areas in the load curves, and vice-versa. PHEVs involved in this process have both charging, and discharging capabilities, and are referred as dual-mode PHEVs. The proposed scheme has been tested with respect to various parameters, and its performance was found satisfactory. © 2015 IEEE

  • 70.
    Kobliakov, Vladimir
    et al.
    Information Systems Department, State University of Aerospace Instrumentation, St.-Petersburg, Russian Federation.
    Turlikov, Andrey
    Information Systems Department, State University of Aerospace Instrumentation, St.-Petersburg, Russian Federation.
    Vinel, Alexey
    Information Systems Department, State University of Aerospace Instrumentation, St.-Petersburg, Russian Federation.
    Distributed Queue Random Multiple Access Algorithm for Centralized Data Networks2006In: Consumer Electronics, 2006. ISCE '06. 2006 IEEE Tenth International Symposium on / [ed] Glasman, K, Logunov, A, Piscataway: IEEE Press, 2006, p. 290-295Conference paper (Refereed)
    Abstract [en]

    The development of efficient media access control protocols for new generation networks, such as IEEE 802.16 metropolitan wireless system, is a challenging task nowadays. The problem of designing an efficient random multiple access algorithm for centralized data network, where subscriber stations transmit bandwidth requests to the base station in an uplink channel, is a focus of the paper. For this purpose special model for a centralized network is considered and new random multiple access algorithm is developed and analyzed. This algorithm, further referred to as distributed queue algorithm (multi-FS-ALOHA), is shown to provide higher tenacity and lower mean delay for the request transmission in comparison to binary exponential backoff, standardized in IEEE 802.16, as well as FS-ALOHA it is based on. Optimization of parameters for the developed algorithm is fulfilled; impact of the noise on its performance is investigated. The analysis is conducted by means of both analytical techniques and simulations

  • 71.
    Koucheryavy, Yevgeni
    et al.
    Department of Communications Engineering, Tampere University of Technology, Tampere, Finland.
    Vinel, AlexeySaint-Petersburg Institute for Informatics and Automation, Russian Academy of Sciences, Russia.Aghvami, HamidKing’s College London, London, United Kingdom.Marvasti, FarokhSharif University of Technology, Tehran, Iran.Daneshmand, MahmoudAT&T Shannon Labs - Research, Florham Park, NJ, USA.Dohler, MischaCTTC (Centre Technologic de Telecomunicacion de Catalunya), Barcelona, Spain.Staehle, DirkUniversity of Würzburg, Würzburg, Germany.Bohnert, Thomas MichaelSiemens CT, München, Germany.Tkachenko, DmitryIEEE Russia Northwest BT/CE/COM Chapter, Saint Petersburg, Russia.Osipov, EvgenyLuleå University of Technology, Luleå, Sweden.
    2008 15th International Conference on Telecommunications, ICT 2008 and MACOM 2008 Workshop Proceedings2008Conference proceedings (editor) (Refereed)
  • 72.
    Koucheryavy, Yevgeni
    et al.
    Department of Communications Engineering, Tampere University of Technology, Tampere, Finland.
    Vinel, AlexeySaint-Petersburg Institute for Informatics and Automation, Russia.Latkov, AlexeyTransport and Telecommunication Institute, University of Applied Science, Valmiera, Latvia.Sneps-Sneppe, ManfredVentspils University College, Ventspils, Latvia.Zhang, YanSimula Research Laboratory and University of Oslo, Norway.Bellalta, BorisUniversitat Pompeu Fabra, Barcelona, Spain.Balandin, SergeyNokia Research Center, Helsinki, Finland.Koutsogiannis, EfthymiosDemocritus University of Thrace, Xanthi, Greece.Diamantopoulos, SotiriosDemocritus University of Thrace, Xanthi, Greece.
    2011 Baltic Congress on Future Internet and Communications2011Conference proceedings (editor) (Refereed)
    Abstract [en]

    The proceedings contain 36 papers. The topics discussed include: evolutionary future Internet service platforms enabling seamless cross layer interoperability; taxonomical approach to the deployment of traceback mechanisms; a novel model for social networks; quality of experience based optimization of heterogeneous multimedia sessions in IMS; aquarema in action: improving the YouTube QoE in wireless mesh networks; on synthesis of dependable MAC protocol for two real-world WSN applications; enterprise security perimeter - e-mail server protection; an ontology approach to development of inter IHS communication subsystem ontology for intrusion handling systems in wireless LANs; a comparative study on cost-benefit analysis of fiber-to-the-home telecommunications systems in Europe; calculation of transmission probability in heterogeneous ad hoc networks; and performance analysis of non-beaconed IEEE 802.15.4 for high-confidence wireless communications.

  • 73.
    Koucheryavy, Yevgeni
    et al.
    Tampere University of Technology, Tampere, Finland.
    Vinel, Alexey
    Tampere University of Technology, Tampere, Finland.
    Molisz, Wojciech
    Gdansk University of Technology, Gdansk, Poland.
    Rak, Jacek
    Gdansk University of Technology, Gdansk, Poland.
    Trivedi, Kishor S.
    Duke University, Durham, NC, USA.
    ICUMT 2012 Congress in St. Petersburg, Russia2013In: IEEE Communications Magazine, ISSN 0163-6804, E-ISSN 1558-1896, no June, p. 3-4Article in journal (Other (popular science, discussion, etc.))
  • 74.
    Kumar, Neeraj
    et al.
    Thapar University, Patiala, Punjab, India.
    Lee, Jong-Hyouk
    Sangmyung University, Cheonan, South Korea.
    Chilamkurti, Naveen
    La Trobe University, Melbourne, Victoria, Australia.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Energy-Efficient Multimedia Data Dissemination in Vehicular Clouds: Stochastic-Reward-Nets-Based Coalition Game Approach2016In: IEEE Systems Journal, ISSN 1932-8184, E-ISSN 1937-9234, Vol. 10, no 2, p. 847-858Article in journal (Refereed)
    Abstract [en]

    In this paper, we investigate an energy efficiency issue for multimedia applications in a vehicular cloud environment. The problem of energy efficiency is formulated as a stochastic reward nets (SRNs)-based coalition game, in which vehicles are assumed as the players that formulate the coalition among themselves using a predefined criteria based on the demand generated and the available resources at the nearest cloudlet. A demand- and supply-based payoff value function is formulated for each player in the game. The processes and actions of the players are represented as SRNs in which each player should have a finite number of tokens to fire its actions. To reduce the delay, each vehicle accesses resources such as memory, processing power, and storage from the nearest cloudlet that may be either at the road side units deployed near the road or on the vehicles. The actions of the players are associated with a cardinality that represents the number of rewards and actions they have taken in a unit interval of time after interacting with an environment that is stochastic in this paper. For each action performed by the players, they may get feedback in the form of a reward or a penalty, according to which each player updates its action probability vector that helps them take the next actions in the game. An energy-efficient algorithm for frame scheduling using the nearest cloudlet is also proposed. The performance of the proposed algorithm is found to be satisfactory with respect to various evaluation metrics. In particular, there is an increment of 10%–15% in profit generation, with 20%–25% reduction in the delay, and an increment of 20% in the packet delivery ratio. © 2015 IEEE

  • 75.
    Kumar, Neeraj
    et al.
    Thapar University, Patiala, Punjab, India.
    Zeadally, Sherali
    University of Kentucky, Lexington, Kentucky, United States.
    Chilamkurti, Naveen
    La Trobe University, Melbourne, Victoria, Australia.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Performance Analysis of Bayesian Coalition Game-Based Energy-Aware Virtual Machine Migration in Vehicular Mobile Cloud2015In: IEEE Network, ISSN 0890-8044, E-ISSN 1558-156X, Vol. 29, no 2, p. 62-69Article in journal (Refereed)
    Abstract [en]

    To provide computing and communication services to mobile clients, vehicular mobile cloud computing has gained lot of attention in recent times. However, one of the biggest challenges for the smooth execution of these services in this environment is the intelligent usage of VMs which may be overloaded due to numerous requests from mobile clients such as vehicles and mobile devices to access these services. However, poor utilization of VMs in this environment causes a lot of energy to be wasted. To address this issue, we propose Bayesian coalition game as-aservice for intelligent context-switching of VMs to support the above defined services in order to reduce the energy consumption, so that clients can execute their services without a performance degradation. In the proposed scheme, we have used the concepts of learning automata (LA) and game theory in which LA are assumed as the players such that each player has an individual payoff based upon the energy consumption and load on the VM. Players interact with the stochastic environment for taking action such as the selection of appropriate VMs and based upon the feedback received from the environment, they update their action probability vector. The performance of the proposed scheme is evaluated by using various performance evaluation metrics such as context-switching delay, overhead generated, execution time, and energy consumption. The results obtained show that the proposed scheme performs well with respect to the aforementioned performance metrics. Specifically, using the proposed scheme there is a reduction of 10 percent in energy consumption, 12 percent in network delay, 5 percent in overhead generation, and 10 percent in execution time. © 1986-2012 IEEE.

  • 76.
    Le, Anhtuan
    et al.
    School of Engineering and Information Sciences, Middlesex University, London, United Kingdom.
    Loo, Jonathan
    School of Engineering and Information Sciences, Middlesex University, London, United Kingdom.
    Lasebae, Aboubaker
    School of Engineering and Information Sciences, Middlesex University, London, United Kingdom.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES). Tampere University of Technology, Tampere, Finland.
    Chen, Yue
    Department of Electronic Engineering, Queen Mary University of London, London, United Kingdom.
    Chai, Michael
    Department of Electronic Engineering, Queen Mary University of London, London, United Kingdom.
    The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks2013In: IEEE Sensors Journal, ISSN 1530-437X, E-ISSN 1558-1748, Vol. 13, no 10, p. 3685-3692Article in journal (Refereed)
    Abstract [en]

    Routing protocol for low power and lossy networks (RPL) is the underlying routing protocol of 6LoWPAN, a core communication standard for the Internet of Things. RPL outperforms other wireless sensor and ad hoc routing protocols in quality of service (QoS), device management, and energy saving performance. The Rank concept in RPL serves multiple purposes, including route optimization, prevention of loops, and managing control overhead. In this paper, we analyze several different types of internal threats that are aimed at the Rank property and study their impact on the performance of the wireless sensor network. Our analysis raises the question of an RPL weakness, which is the lack of a monitoring parent in every node. In RPL, the child node only receives the parent information through control messages, but it cannot check the services that its parent provide hence it will follow a bad quality route if it has a malicious parent. Our results show that different types of the Rank attacks can be used to intentionally downgrade specific QoS parameters. This paper also reveals that attack in a high forwarding load area will have more impact on network performance than attack in other areas. The defenders can use the knowledge of such correlation between attack location and its impact to set higher security levels at particular positions by monitoring sensitive network parameters and detecting the anomalies © 2001-2012 IEEE.

  • 77.
    Lee, Ying Loong
    et al.
    Multimedia University, Selangor, Malaysia.
    Chuah, Teong Chee
    Multimedia University, Selangor, Malaysia.
    Loo, Jonathan
    Middlesex University, London, United Kingdom.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Recent Advances in Radio Resource Managementfor Heterogeneous LTE/LTE-A Networks2014In: IEEE Communications Surveys and Tutorials, ISSN 1553-877X, E-ISSN 1553-877X, Vol. 16, no 4, p. 2142-2180Article in journal (Refereed)
    Abstract [en]

    As heterogeneous networks (HetNets) emerge as one of the most promising developments toward realizing the target specifications of Long Term Evolution (LTE) and LTE-Advanced (LTE-A) networks, radio resource management (RRM) research for such networks has, in recent times, been intensively pursued. Clearly, recent research mainly concentrates on the aspect of interference mitigation. Other RRM aspects, such as radio resource utilization, fairness, complexity, and QoS, have not been given much attention. In this paper, we aim to provide an overview of the key challenges arising from HetNets and highlight their importance. Subsequently, we present a comprehensive survey of the RRM schemes that have been studied in recent years for LTE/LTE-A HetNets, with a particular focus on those for femtocells and relay nodes. Furthermore, we classify these RRM schemes according to their underlying approaches. In addition, these RRM schemes are qualitatively analyzed and compared to each other. We also identify a number of potential research directions for future RRM development. Finally, we discuss the lack of current RRM research and the importance of multi-objective RRM studies. ©2014 IEEE.

  • 78.
    Lien, Shao-Yu
    et al.
    National Chung Cheng University, Chia-Yi, Taiwan.
    Kuo, Yen-Chih
    National Formosa University, Yulin, Taiwan.
    Deng, Der-Jiunn
    National Changhua University of Education, Changhua, Taiwan.
    Tsai, Hua-Lung
    Industrial Technology Research Institute, Hsinchu, Taiwan.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Benslimane, Abderrahim
    University of Avignon, Avignon, France.
    Latency-Optimal mmWave Radio Access for V2X Supporting Next Generation Driving Use Cases2019In: IEEE Access, E-ISSN 2169-3536, Vol. 7, p. 6782-6795Article in journal (Refereed)
    Abstract [en]

    With the facilitation of the fifth generation (5G) New Radio (NR), Vehicle-to-Everything (V2X) applications have entered a brand new era to sustain the next generation driving use cases of advanced driving, vehicle platooning, extended sensors and remote driving. To deploy these driving use cases, the service requirements however include low latency, high reliability, and high data rates, which thus render utilizing millimeter wave (mmWave) carriers (spectrum above 6 GHz) as a remedy to empower the next generation driving use cases. However, suffering from severe signal attenuation, transmission range of mmWave carriers may be very limited, which is unfavorable in mobile network deployment to offer seamless services, and compel directional transmission/reception using beamforming mandatory. For this purpose, both a transmitter and a receiver should sweep their beams toward different directions over time, and a communication link can be established only if a transmitter and a receiver arrange their beam directions toward each other at the same time (known as beam alignment). Unfortunately, latency of performing beam sweeping to achieve beam alignment turns out the be a dominating challenge to exploit mmWave, especially for the next generation driving use cases. In this paper, we consequently derive essential principles and designs for beam sweeping at the transmitter side and receivers side, which not only guarantee the occurrence of beam alignment but also optimize the latency to achieve beam alignment. Based on the availabilities of a common geographic reference and the knowledge of beam sweeping scheme at the transmitter side, we derive corresponding performance bounds in terms of latency to achieve beam alignment, and device corresponding latency-optimal beam sweeping schemes. The provided engineering insights therefore pave inevitable foundations to practice the next generation driving use cases using mmWave carriers.

  • 79.
    Lin, Chao
    et al.
    Wuhan University, Wuhan, China.
    He, Debiao
    Wuhan University, Wuhan, China.
    Kumar, Neeraj
    Thapar University, Patiala, India.
    Choo, Kim-Kwang Raymond
    University of Texas at San Antonio, San Antonio, USA.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Huang, Xinyi
    Fujian Normal University, Fuzhou, China.
    Security and Privacy for the Internet of Drones: Challenges and Solutions2018In: IEEE Communications Magazine, ISSN 0163-6804, E-ISSN 1558-1896, Vol. 56, no 1, p. 64-69Article in journal (Refereed)
    Abstract [en]

    A recent trend in both industry and research is the Internet of Drones, which has applications in both civilian and military settings. However, drones (also known as unmanned aerial vehicles) are generally not designed with security in mind, and there are fundamental security and privacy issues that need study. Hence, in this article, we study the architecture and its security and privacy requirements. We also outline potential solutions to address challenging issues such as privacy leakage, data confidentiality protection, and flexible accessibility, with the hope that this article will provide the basis for future research in this emerging area.

  • 80.
    Lin, Jia-Chin
    et al.
    Department of Communication Engineering, National Central University, Taoyuan 32001, Taiwan.
    Mecklenbräuker, Christoph
    Institute of Telecommunications, Vienna University of Technology, 1040 Vienna, Austria.
    Vinel, Alexey
    Department of Communications Engineering, Tampere University of Technology, 33101 Tampere, Finland.
    Vassilaras, Spyridon
    Broadband Wireless and Sensor Networks Group, Athens Information Technology Center for Research and Education, 19002 Athens, Greece.
    Zhang, Tao
    Telcordia Technologies, Piscataway, NJ 08854, United States.
    Lo, Kuen-Rong
    Telecommunication Laboratories, Chunghwa Telecom Co., Ltd., Taoyuan 32601, Taiwan.
    Special Section on Telematics Advances for Vehicular Communication Networks2012In: IEEE Transactions on Vehicular Technology, ISSN 0018-9545, E-ISSN 1939-9359, Vol. 61, no 1, p. 1-2Article in journal (Refereed)
  • 81.
    Liu, Dantong
    et al.
    Networks Group, School of Electronic Engineering and Computer Science, Queen Mary University of London, London, United Kingdom.
    Chen, Yue
    Networks Group, School of Electronic Engineering and Computer Science, Queen Mary University of London, London, United Kingdom.
    Zhang, Tiankui
    Next Generation Communication System Theory and Technology Lab, School of Information and Telecommunications Engineering, Beijing University of Posts and Telecommunications, Beijing, China.
    Chai, Kok Keong
    Networks Group, School of Electronic Engineering and Computer Science, Queen Mary University of London, London, United Kingdom.
    Loo, Jonathan
    Department of Computer Communications, School of Sciences and Technology, Middlesex University, London, United Kingdom.
    Vinel, Alexey
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Stackelberg Game Based Cooperative User Relay Assisted Load Balancing in Cellular Networks2013In: IEEE Communications Letters, ISSN 1089-7798, E-ISSN 1558-2558, Vol. 17, no 2, p. 424-427Article in journal (Refereed)
    Abstract [en]

    We propose a Stackelberg game based cooperative user relay assisted load balancing (LB) scheme to tackle SNR degradation problem of shifted cell-edge users which commonly occurs in a conventional direct handover LB scheme. In the proposed scheme, users from a lightly loaded cell can be selected as cooperative user-relays and will be paid by the shifted cell-edge users. Stackelberg game theory is applied to optimize the strategies of both the user relays and shifted cell-edge users, in order to maximize both of their utilities in terms of SNR and payment. Theoretical analysis and simulation study are undertaken to show the effectiveness of the proposed scheme. © 1997-2012 IEEE.

  • 82.
    Lott, Matthias
    et al.
    Siemens AG, Communications, Munich, Germany.
    Vinel, Alexey
    State University of Aerospace Instrumentation, St.-Petersburg, Russia.
    Zhang, Ying
    Siemens AG, Communications, Munich, Germany.
    Propagation Modeling for Systems Beyond 3G2005In: Proceedings of International Symposium on Wireless Personal Multimedia Communications: Vol. III, Aalborg: Aalborg Universitetsforlag, 2005, p. 1838-1842Conference paper (Refereed)
    Abstract [en]

    Introducing multi-hop (MH) and time division duplex (TDD) in high-speed wireless communication systems arise in challenges for system simulations, specifically in radio propagation modeling. In this paper a new propagation model is presented for systems B3G that make use of MH and TDD. The model is typically suited for urban and sub-urban scenarios with streets and many buildings where line-of-sight (LoS) and non-LoS (NLoS) conditions have to be distinguished. Different to conventional propagation models the new model reduces the required memory considerably. Instead of an exponential increase in the required storage space with the size of the scenario, the storage space increases only linearly when applying the new model, which is based on the idea to distinguish between LoS and NLoS conditions. © 2005 WPMC

  • 83.
    Luan, Tom H.
    et al.
    Xi'an Jiaotong University, Xi'an, China.
    Chen, Cailian
    Shanghai Jiao Tong University, Shanghai, China & IEEE Globecom, Washington DC, USA.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Cai, Lin
    IEEE Globecom, Washington DC, USA & University of Victoria, Victoria, BC, Canada.
    Chen, Shanzhi
    Beijing University of Posts and Telecommunications, Beijing, China.
    Guest Editorial: Emerging Technology for 5G Enabled Vehicular Networks2016In: IEEE Transactions on Vehicular Technology, ISSN 0018-9545, E-ISSN 1939-9359, Vol. 65, no 10, p. 7827-7830, article id 7590151Article in journal (Refereed)
    Abstract [en]

    The papers in this special section focus on 5G mobile communication enabled vehicular networks. This section is designed to provide the academic and industrial communities an excellent venue to present the vision, research, and new solutions on the key technologies emerging for 5G enabled vehicular networks.

  • 84.
    Lyamin, Nikita
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Deng, Qichen
    Delft University of Technology, Delft, Netherlands.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Study of the Platooning Fuel Efficiency under ETSI ITS-G5 Communications2016In: 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC), Piscataway, NJ: IEEE, 2016, p. 551-556Conference paper (Refereed)
    Abstract [en]

    In this paper we evaluate the performance of platoon enabled by contemporary ITS-G5 vehicular communications through a number of simulation experiments. We assess platooning fuel consumption performance under two communication setups and estimate the potential influence of the communication system on the efficiency of the platooning. We also make an attempt to transform our results on platoon fuel efficiency into potential cost reduction gain. Our study shows that platooning fuel-efficiency may vary depending on the communication setup.

  • 85.
    Lyamin, Nikita
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Kleyko, Denis
    Luleå University of Technology, Luleå, Sweden.
    Delooz, Quentin
    University of Liège, Liège, Belgium.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    AI-Based Malicious Network Traffic Detection in VANETs2018In: IEEE Network, ISSN 0890-8044, E-ISSN 1558-156X, Vol. 32, no 6, p. 15-21Article in journal (Refereed)
    Abstract [en]

    Inherent unreliability of wireless communications may have crucial consequences when safety-critical C-ITS applications enabled by VANETs are concerned. Although natural sources of packet losses in VANETs such as network traffic congestion are handled by decentralized congestion control (DCC), losses caused by malicious interference need to be controlled too. For example, jamming DoS attacks on CAMs may endanger vehicular safety, and first and foremost are to be detected in real time. Our first goal is to discuss key literature on jamming modeling in VANETs and revisit some existing detection methods. Our second goal is to present and evaluate our own recent results on how to address the real-time jamming detection problem in V2X safety-critical scenarios with the use of AI. We conclude that our hybrid jamming detector, which combines statistical network traffic analysis with data mining methods, allows the achievement of acceptable performance even when random jitter accompanies the generation of CAMs, which complicates the analysis of the reasons for their losses in VANETs. The use case of the study is a challenging platooning C-ITS application, where V2X-enabled vehicles move together at highway speeds with short inter-vehicle gaps.

  • 86.
    Lyamin, Nikita
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Kleyko, Denis
    Department of Computer Science, Electrical and Space Engineering, Computer Science, Luleå University of Technology, Luleå, Sweden.
    Delooz, Quentin
    Center of Automotive Research on Integrated Safety Systems and Measurement Area (CARISSMA), Ingolstadt, Germany.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Real-time jamming DoS detection in safety-critical V2V C-ITS using data mining2019In: IEEE Communications Letters, ISSN 1089-7798, E-ISSN 1558-2558, Vol. 23, no 3, p. 442-445Article in journal (Refereed)
    Abstract [en]

    A data mining-based method for real-time detection of radio jamming Denial-of-Service (DoS) attacks in IEEE 802.11p vehicle-to-vehicle (V2V) communications is proposed. The method aims at understanding the reasons for losses of periodic cooperative awareness messages (CAM) exchanged by vehicles in a platoon. Detection relies on a knowledge of IEEE 802.11p protocols rules as well as on historical observation of events in the V2V channel. In comparison to the state-of-the-art method, the proposed method allows operating under the realistic assumption of random jitter accompanying every CAM transmission. The method is evaluated for two jamming models: random and ON-OFF. 

  • 87.
    Lyamin, Nikita
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Bellalta, Boris
    Universitat Pompeu Fabra, Barcelona, Catalunya, Spain.
    Configuring the Decentralized Congestion Control for ETSI ITS-G5 C-ITS Applications2019In: IEEE Communications Letters, ISSN 1089-7798, E-ISSN 1558-2558Article in journal (Refereed)
    Abstract [en]

    Decentralized Congestion Control (DCC) is one the central components of inter-vehicular communications protocol stack enabling Cooperative Intelligent Transportation System (C-ITS). In this letter we first present an analytical framework that allows to tune parameters of the DCC algorithm specified by ETSI. Then we suggest two approaches to optimize the DCC configuration using our framework. Finally, we evaluate the performance of the proposed approaches using detailed simulation experiments. We demonstrate that proposed approaches are able to control channel busy ratio stably, while proposed analytical model precisely estimates application level metrics.

  • 88.
    Lyamin, Nikita
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Jonsson, Magnus
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Does ETSI beaconing frequency control provide cooperative awareness?2015In: 2015 IEEE International Conference on Communication Workshop (ICCW), Piscataway, NJ: IEEE Press, 2015, p. 2393-2398Conference paper (Refereed)
    Abstract [en]

    Platooning is an emergent vehicular application aiming at increasing road safety, efficiency and driving comfort. The cooperation between the vehicles in a platoon is achieved by the frequent exchange of periodic broadcast Cooperative Awareness Messages (CAMs) also known as beacons. CAM triggering conditions are drafted in the standard ETSI EN 302 637–2 and are based on the dynamics of an originating vehicle. These conditions are checked repeatedly with a certain sampling rate. We have discovered that the improper choice of the sampling rate value may increase the number of collisions between CAMs at the IEEE 802.11p medium access control layer and, therefore, diminish the efficiency of beaconing in a platoon. © 2015 IEEE

  • 89.
    Lyamin, Nikita
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Jonsson, Magnus
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Poster: On the Performance of ETSI EN 302 637-2CAM Generation Frequency Management2014In: 2014 IEEE Vehicular Networking Conference (VNC) / [ed] Falko Dressler, Onur Altintas, Suman Banerjee, Björn Scheuermann & David Eckhoff, Piscataway, NJ: IEEE Press, 2014, p. 107-108Conference paper (Refereed)
    Abstract [en]

    ETSI EN 302 637-2 draft standard defines the triggering rules for Cooperative Awareness Messages (CAMs). It specifies how the frequency of CAM generation shall depend on the dynamics of an originating vehicle. We have discovered that for a group of vehicles in the proximity, which follow similar movement patterns, the performance of the CAM generation frequency management might deteriorate over time.

  • 90.
    Lyamin, Nikita
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Jonsson, Magnus
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Bellalta, Boris
    Universitat Pompeu Fabra, Barcelona, Spain.
    Cooperative awareness in VANETs: On ETSI EN 302 637-2 performance2018In: IEEE Transactions on Vehicular Technology, ISSN 0018-9545, E-ISSN 1939-9359, Vol. 67, no 1, p. 17-28Article in journal (Refereed)
    Abstract [en]

    Cooperative Awareness on the road is aiming to support the road users with knowledge about the surroundings relying on the information exchange enabled by vehicular com- munications. To achieve this goal European Telecommunication Standard Institute (ETSI) delivered the standard EN 302 637-2 for Cooperative Awareness Messages (CAM). The CAM trig- gering conditions are based on the dynamics of the originating vehicle, which is checked periodically. In this paper, we show that standardized ETSI protocol may demonstrate a decrease in communication performance under several realistic mobility patterns. The potential influence of the discovered phenomena on two typical mobility scenarios is studied.

  • 91.
    Lyamin, Nikita
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Jonsson, Magnus
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Loo, Jonathan
    Middlesex University, London, United Kingdom.
    Real-time Detection of Denial-of-Service Attacks in IEEE 802.11p Vehicular Networks2014In: IEEE Communications Letters, ISSN 1089-7798, E-ISSN 1558-2558, Vol. 18, no 1, p. 110-113Article in journal (Refereed)
    Abstract [en]

    A method for real-time detection of Denial-of-Service (DoS) attacks in IEEE 802.11p vehicular ad-hoc networks (VANETs) is proposed. The study is focused on the "jamming" of periodic position messages (beacons) exchanged by vehicles in a platoon. Probabilities of attack detection and false alarm are estimated for two different attacker models. © 2014 IEEE

  • 92.
    Lyamin, Nikita
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Smely, Dieter
    Kapsch TrafficCom, Vienna, Austria.
    Bellalta, Boris
    Universitat Pompeu Fabra, Barcelona, Spain.
    ETSI DCC: Decentralized Congestion Control in C-ITS2018In: IEEE Communications Magazine, ISSN 0163-6804, E-ISSN 1558-1896, Vol. 56, no 12, p. 112-118Article in journal (Refereed)
    Abstract [en]

    ETSI DCC: Decentralized Congestion Control in C-ITS is a mandatory component of the 5.9 GHz ITS-G5 vehicular communication protocol stack that reduces radio channel overload, range degradation, and self interference. In this tutorial article we explain its principle, describe related ongoing standardization activities, evaluate its performance for emerging cooperative driving applications, and identify ways for improvement. We show that failure to use a proper DCC parameterization can impact negatively on the performance of cooperative vehicular applications.

  • 93.
    Lyu, Xinchen
    et al.
    Beijing University of Posts and Telecommunications, Beijing, China.
    Tian, Hui
    Beijing University of Posts and Telecommunications, Beijing, China.
    Jiang, Li
    Guangdong University of Technology, Guangzhou, China.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Maharjan, Sabita
    Simula Research Laboratory, Oslo, Norway & University of Oslo, Oslo, Norway.
    Gjessing, Stein
    Simula Research Laboratory, Oslo, Norway & University of Oslo, Oslo, Norway.
    Zhang, Yan
    University of Oslo, Oslo, Norway.
    Selective Offloading in Mobile Edge Computing for the Green Internet of Things2018In: IEEE Network, ISSN 0890-8044, E-ISSN 1558-156X, Vol. 32, no 1, p. 54-60Article in journal (Refereed)
    Abstract [en]

    Mobile edge computing provides the radio access networks with cloud computing capabilities to fulfill the requirements of the Internet of Things services such as high reliability and low latency. Offloading services to edge servers can alleviate the storage and computing limitations and prolong the lifetimes of the IoT devices. However, offloading in MEC faces scalability problems due to the massive number of IoT devices. In this article, we present a new integration architecture of the cloud, MEC, and IoT, and propose a lightweight request and admission framework to resolve the scalability problem. Without coordination among devices, the proposed framework can be operated at the IoT devices and computing servers separately, by encapsulating latency requirements in offloading requests. Then a selective offloading scheme is designed to minimize the energy consumption of devices, where the signaling overhead can be further reduced by enabling the devices to be self-nominated or self-denied for offloading. Simulation results show that our proposed selective offloading scheme can satisfy the latency requirements of different services and reduce the energy consumption of IoT devices. © 2018 IEEE 

  • 94.
    Mapp, Glenford
    et al.
    Middlesex University, London, UK.
    Gosh, Arindam
    Middlesex University, London, UK.
    Paranthaman, Vishnu Vardhan
    Middlesex University, London, UK.
    Iniovosa, Victor Otite
    Middlesex University, London, UK.
    Loo, Jonathan
    Middlesex University, London, UK.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Exploring Seamless Connectivity and Proactive Handover Techniques in VANET Systems2016In: Intelligent Transportation Systems: Dependable Vehicular Communications for Improved Road Safety / [ed] Muhammad Alam, Joaquim Ferreira & José Fonseca, Cham: Springer, 2016, p. 195-220Chapter in book (Refereed)
    Abstract [en]

    In order to provide Dependable Vehicular Communications for Improved Road Safety, it is necessary to have reliable Vehicular-to-Infrastructure (V2I) and Vehicle-to-Vehicle (V2V) communication. Such requirements demand that the handover process as vehicles move between adjacent Roadside Units (RSUs) be examined in detail to understand how seamless communication can be achieved. Since the use of beacons is a key part of VANETs, it is necessary to investigate how the beaconing process affects the opportunities to effect handovers. A framework is needed to be able to calculate the regions of overlap in adjacent RSU coverage ranges to guarantee ubiquitous connectivity. A highly mobile environment, therefore, makes this a serious challenge and points to the need to look at proactive handover techniques. This chapter, therefore, explores the development of the proactive handover mechanisms required to provide seamless connectivity and dependable communication in VANET environments.

  • 95.
    Marinho, Marco A. M.
    et al.
    University of Brasília (UnB), Brasília, Brazil & German Aerospace Center (DLR), Cologne, Germany.
    da Costa, João Paulo C. L.
    University of Brasília (UnB), Brasília, Brazil; llmenau University of Technology, Ilmenau, Germany & Fraunhofer Institute for Integrated Circuits IIS, Erlangen, Germany.
    Antreich, Felix
    German Aerospace Center (DLR), Cologne, Germany.
    de Almeida, André L. F.
    Federal University of Ceará (UFC), Fortaleza, Brazil.
    Del Galdo, Giovanni
    llmenau University of Technology, Ilmenau, Germany & Fraunhofer Institute for Integrated Circuits IIS, Erlangen, Germany.
    de Freitas, Edison Pignaton
    University of Brasília (UnB), Brasília, Brazil & Informatics Institute, Federal University of Rio Grande do Sul (UFRGS), Porto Alegre, Brazil.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Array interpolation based on multivariate adaptive regression splines2016In: 2016 IEEE Sensor Array and Multichannel Signal Processing Workshop (SAM), Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), 2016Conference paper (Refereed)
    Abstract [en]

    Many important signal processing techniques such as Spatial Smoothing, Forward Backward Averaging and Root-MUSIC, rely on antenna arrays with specific and precise structures. Arrays with such ideal structures, such as a centro-hermitian structure, are often hard to build in practice. Array interpolation is used to enable the usage of these techniques with imperfect (not having a centro-hermitian structure) arrays. Most interpolation methods rely on methods based on least squares (LS) to map the output of a perfect virtual array based on the real array. In this work, the usage of Multivariate Adaptive Regression Splines (MARS) is proposed instead of the traditional LS to interpolate arrays with responses largely different from the ideal.

  • 96.
    Marinho, Marco A. M.
    et al.
    University of Brasilia, Brasilia, Brazil.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Antreich, Felix
    Federal University of Ceara, Fortaleza, Brazil.
    da Costa, João Paulo Carvalho Lustosa
    University of Brasilia, Brasilia, Brazil.
    Pignaton de Freitas, Edison
    Federal University of Rio Grande do Sul, Porto Alegre, Brazil.
    Antenna Array Based Localization Scheme for Vehicular Networks2017In: 2017 IEEE International Conference on Computer and Information Technology (CIT) / [ed] Lisa O’Conner, Los Alamitos: IEEE Computer Society, 2017, p. 142-146Conference paper (Refereed)
    Abstract [en]

    Vehicular ad hoc networks (VANETs) are emerging as the possible solution for multiple concerns in road traffic such as mobility and safety. One of the main concerns present in VANETs is the localization and tracking of vehicles. This work presents a passive vehicle localization and tracking method based on direction of arrival (DOA) estimation. The proposed method does not rely on external sources of information such as Global Navigation Satellite Systems (GNSS) and can be used to mitigate the possibility of spoofing or to provide a second independent source of position estimation for integrity purposes. The proposed algorithm uses array signal processing techniques to estimate not only the position but also the direction of other vehicles in network. Furthermore, it is a fully passive method and can alleviate the network load since it does not require any location based data exchange and can be performed by any listening vehicle using the signal of any data transmission. A set of numerical simulations is used to validate the proposed method and the results are shown to be more precise than the average accuracy of Global Position System (GPS) receivers. © Copyright 2017 IEEE

  • 97.
    Marinho, Marco A. M.
    et al.
    Halmstad University, School of Information Technology. University of Brasília (UnB), Department of Electrical Engineering (ENE), Brasília, Brazil.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Tufvesson, Fredrik
    Department of Electrical and Information Technology, Lund University, Lund, Sweden.
    Antreich, Felix
    Department of Teleinformatics Engineering - Federal University of Ceará (UFC), Fortaleza, Brazil.
    Da Costa, João Paulo C.L.
    University of Brasília (UnB), Department of Electrical Engineering (ENE), Brasília, Brazil.
    Performance Assessment for Distributed Broadband Radio Localization2018In: 2018 52nd Asilomar Conference on Signals, Systems, and Computers, Washington, DC: IEEE, 2018, p. 20-23Conference paper (Refereed)
    Abstract [en]

    Various emerging technologies, such as autonomous vehicles and fully autonomous flying, require precision positioning. This work presents a localization and tracking method based on joint direction of arrival (DOA), time delay, and range estimation using the SAGE algorithm. The proposed method does not rely on external sources of information such as global navigation satellite systems (GNSS). The method is opportunistic and does not require any location-based data exchange. A set of numerical simulations is presented to assess the performance of the proposed method.

  • 98.
    Marinho, Marco
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS). University of Brasília (UnB), Department of Electrical Engineering (ENE), Brasília, Brazil.
    Antreich, Felix
    Department of Teleinformatics Engineering Federal University of Ceará (UFC), Fortaleza, Brazil.
    da Costa, João Paulo C.L.
    University of Brasília (UnB), Department of Electrical Engineering (ENE), Brasília, Brazil.
    Caizzone, Steffano
    German Aerospace Center (DLR), Institute for Communications and Navigation, Wessling, Germany.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Pignaton de Freitas, Edison
    Federal University of Rio Grande do Sul (UFRGS), Informatics Institute, Porto Alegre, Brazil.
    Robust Nonlinear Array Interpolation for Direction of Arrival Estimation of Highly Correlated Signals2018In: Signal Processing, ISSN 0165-1684, E-ISSN 1872-7557, Vol. 144, p. 19-28Article in journal (Refereed)
    Abstract [en]

    Important signal processing techniques need that the response of the different elements of a sensor array has specific characteristics. For physical systems this often is not achievable as the array elements’ responses are affected by mutual coupling or other effects. In such cases, it is necessary to apply array interpolation to allow the application of ESPRIT, Forward Backward Averaging (FBA), and Spatial Smoothing (SPS). Array interpolation provides a model or transformation between the true and a desired array response. If the true response of the array becomes more distorted with respect to the desired one or the considered region of the field of view of the array increases, nonlinear approaches becomes necessary. This work presents two novel methods for sector discretization. An Unscented Transform (UT) based method and a principal component analysis (PCA) based method are discussed. Additionally, two novel nonlinear interpolation methods are developed based on the nonlinear regression schemes Multivariate Adaptive Regression Splines (MARS) and Generalized Regression Neural Networks (GRNNs). These schemes are extended and applied to the array interpolation problem. The performance of the proposed methods is examined using simulated and measured array responses of a physical system used for research on mutual coupling in antenna arrays. © 2017 The Author(s). Published by Elsevier B.V.

  • 99.
    Marinho, Marco
    et al.
    Department of Electrical Engineering (ENE), University of Brasília (UnB), Brazil & Institute for Communications and Navigation, German Aerospace Center (DLR), Germany.
    da Costa, Joao Paulo C. L.
    Department of Electrical Engineering (ENE), University of Brasília (UnB), Brazil & Institute for Communications and Navigation, German Aerospace Center (DLR), Germany & Institute for Information Technology, Ilmenau University of Technology, Ilmenau, Germany.
    Antreich, Felix
    Institute for Communications and Navigation, German Aerospace Center (DLR), Germany.
    Pignaton de Freitas, Edison
    Department of Electrical Engineering (ENE), University of Brasília (UnB), Brazil & Informatics Institute, Federal University of Rio Grande Do sul (UFRGS), Brazil.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Adaptive Communication and Cooperative MIMO Cluster Formation for Improved Lifetime in Wireless Sensor Networks2016In: Proceedings - WiSEE 2016: 2016 IEEE International Conference on Wireless for Space and Extreme Environments, New York: IEEE, 2016, p. 190-195, article id 7877330Conference paper (Refereed)
    Abstract [en]

    One of the main limitations that still keeps Wireless Sensor Networks (WSNs) from being adopted in a large scale is the limited energy supply, i.e. the lifetime of the nodes that constitute the network. The wireless communication between nodes is responsible for most of the energy consumed in WSNs. A promising method to improve the energy efficiency is the usage of a Cooperative Multiple Input Multiple Output (CO-MIMO) scheme, where nodes form clusters to transmit and receive signals using a virtual antenna array. This work presents a study on the energy consumption of multi-hop and single-hop transmission compared to CO-MIMO and how to select the most efficient method. It also proposes a method for adaptively choosing the number of nodes that form a CO-MIMO cluster in order to maximize the lifetime of the network and to avoid disconnections. The proposed method takes into account not only the total energy consumption but also the distribution of energy within the network, aiming to keep the energy distribution across the network as uniform as possible. The effects of the proposed methods in the total available energy of the network and in the distribution of the energy is presented by means of numerical simulations. © 2016 IEEE.

  • 100.
    Mehmood, Rashid
    et al.
    University of Huddersfield, Huddersfield, United Kingdom.
    Vinel, Alexey
    Department of Communications Engineering, Tampere University of Technology, Tampere, Finland.
    Berbineau, Marion
    Institut français des sciences et technologies des transports, de l'aménagement et des réseaux (IFSTTAR), Marne-la-Vallée, France.
    The Nets4Cars & Nets4Trains Workshop Series2012In: IEEE Global Communications Newsletter, ISSN 0163-6804, no October, p. 3-4Article in journal (Other (popular science, discussion, etc.))
1234 51 - 100 of 190
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf