An intelligent parking sharing system for green and smart cities based IoT
Today car drivers struggle to find a free parking space for their cars. It is considered a big challenge specially in large cities and in rush hours. Many studies considered this problem and how it influences our life. This increases ...
Target vehicle lane-change intention detection: An approach based on online transfer learning
The lack of visual information from the driver of the target vehicle makes it difficult to detect the intention of the target vehicle early before the start of the lane-change maneuver. Moreover, in current studies, the prerequisite ...
Data tampering attacks diagnosis in dynamic wireless sensor networks
Real-world wireless sensor networks (WSNs) usually have dynamic topologies and are vulnerable to data tampering attacks, which may possibly lead to serious consequences. This paper addresses the issue of defending against data ...
Service Differentiation in IEEE 802.11ah WLAN under Restricted Access Window based MAC protocol
The restricted access window (RAW) based channel access scheme proposed for IEEE 802.11ah wireless LAN (WLAN) divides the stations (STAs) in the network into groups and allocates RAW slots for each group of STAs. In this way, the STAs ...
Providing a CoAP-based technique to get wireless sensor data via IoT gateway
The advancement of wireless sensor networks and the possibility of using Internet protocols in devices with limited resources (such as sensors) have changed the future of the Internet. How to interact and exchange information is one of ...
Highlights
- This paper provides a technique to reduce the burden imposed on small and medium size packets on 6LoWPAN/CoAP multi-hop networks.
Real-time optimizations in energy profiles and end-to-end delay in WSN using two-hop information
This paper proposes a routing protocol established upon the IEEE 802.15.4a that enhances the delay and energy efficiency in Wireless sensor networks (WSN) using two-hop information. Owing to the miniaturized form and non-rechargeable ...
Graphical abstractDisplay Omitted
Highlights
- A novel potential relay information (PRI) metric which measures the routing abilities of nodes in WSN is introduced. The PRI reflects real timeliness and ...
Generation of realistic cloud access times for mobile application testing using transfer learning
The network Quality of Service (QoS) metrics such as the access time, the bandwidth, and the packet loss play an important role in determining the Quality of Experience (QoE) of mobile applications. Various factors like the Radio ...
MECGuard: GRU enhanced attack detection in Mobile Edge Computing environment
With the commercialization of 5G technology, various Mobile Edge Computing (MEC) services are being deployed widely. Generally, MEC services rely on MEC devices and servers deployed at the edge of the network. Whether it is a MEC ...
EdgeSOM: Distributed Hierarchical Edge-driven IoT Data Analytics Framework
With the rapid growth in the number of interacting IoT devices producing a huge amount of data, existing traditional systems are unable to handle the resulting data flow in such a way as to meet timeliness and performance requirements ...
AdS: An adaptive spectrum sensing technique for survivability under jamming attack in Cognitive Radio Networks
IEEE 802.22 Cognitive Radio Network (CRN) allows sharing of geographically unused spectrum allocated to the television broadcast service, on a non-interfering basis. CRNs make use of Dynamic Spectrum Access (DSA) which is a two-stage ...
Enhanced network sensitive access control scheme for LTE–LAA/WiFi coexistence: Modeling and performance analysis
Implementation of 5G and beyond networks is looking to expand the operation of licensed systems into unlicensed frequency bands through technologies such as license assisted access (LAA) and New Radio Unlicensed (NR-U). LAA aggregates ...
Planning Fog networks for time-critical IoT requests
The massive growth of the Internet of Things (IoT) applications and the challenges of Cloud computing have increased the importance of Fog networks for timely processing the requests from delay-sensitive applications. A Fog network ...
Graphical abstractDisplay Omitted
Highlights
- Applying a priority queuing analytical model to calculate the response time of time-critical requests in Fog networks.
Amalgamation of blockchain and IoT for smart cities underlying 6G communication: A comprehensive review
Nowadays, increasing urbanization has necessitated the social, environmental, and economic development of cities to enhance the Quality of Life (QoL) significantly and introduces the “Smart City” concept. It integrates Information and ...
Highlights
- To enable readers to familiar with smart city environment and blockchain technology.
Security policies definition and enforcement utilizing policy control function framework in 5G
- German Peinado Gomez,
- Jordi Mongay Batalla,
- Yoan Miche,
- Silke Holtmanns,
- Constandinos X. Mavromoustakis,
- George Mastorakis,
- Noman Haider
This research analyses new approaches to security enforcement in fifth generation (5G) architecture from end to end perspective. With the aim of finding a suitable and effective unified schema across the different network domains, it ...
Multi-windowed vertex-frequency analysis for signals on undirected graphs
The recent emerging graph signal processing technologies have been widely applied to analyze signals defined on irregular domains, e.g., data collected from social networks, sensor networks, or transportation systems. Vertex frequency ...
An intelligent work order classification model for government service based on multi-label neural network
The classification of work orders for livelihood service play an important role in the e-government system, which goal is to push these work orders to the corresponding processing department. Although many studies have realized the ...
A security framework for Ethereum smart contracts
The use of blockchain and smart contracts have not stopped growing in recent years. Like all software that begins to expand its use, it is also beginning to be targeted by hackers who will try to exploit vulnerabilities in both the ...
Exploring active attacks for three incorrect implementations of the ISO/IEC 9798 in satellite networks
A variety of satellite authentication protocols have been proposed to meet the requirements of the security and efficiency in satellite communication networks nowadays. Most of them are variants from entity authentication technical ...
A blockchain-based access control and intrusion detection framework for satellite communication systems
Recent works have shown great potentials for enhancing satellite communications (SATCOM) in terms of security and privacy from blockchains and smart contracts. However, smart contracts deployed on the blockchain also suffer from ...
Network coding assisted reliable multi-source multicasting over a multi-hop wireless mesh network
This paper introduces a Network Coding (NC) Assisted Reliable Multi-Source Multicasting (NCRMM) technique for multi-hop wireless mesh networks. The NCRMM scheme decreases the average number of packet transmissions in a network, which ...
Time-predictable routing algorithm for Time-Sensitive Networking: Schedulable guarantee of Time-Triggered streams
To make manufacturers more intelligent in the production of cyber-physical systems (CPS), the IEEE 802.1 working group proposes a Time-Sensitive Network (TSN) standard based on traditional Ethernet. TSN can help the industrial ...