Current Issue : April - June Volume : 2016 Issue Number : 2 Articles : 4 Articles
Sharp increase of video traffic is expected to account for the majority of traffic in future 5G networks. This paper introduces the\nSELFNET 5G project and describes the video streaming use case that will be used to demonstrate the self-optimising capabilities of\nSELFNET�s autonomic network management framework. SELFNET�s framework will provide an advanced self-organizing network\n(SON) underpinned by seamless integration of Software Defined Networking (SDN), Network Function Virtualization (NFV), and\nnetwork intelligence. The self-optimisation video streaming use case is going beyond traditional quality of service approaches to\nnetworkmanagement. A set of monitoring and analysis components will facilitate a user-oriented, quality of experience (QoE) and\nenergy-aware approach. Firstly, novel SON-Sensors will monitor both traditional network state metrics and new video and energy\nrelated metrics. The combination of these low level metrics provides highly innovative health of network (HoN) composite metrics.\nHoN composite metrics are processed via autonomous decisions not only maintaining but also proactively optimising users� video\nQoE while minimising the end-to-end energy consumption of the 5G network. This contribution provided a detailed technical\noverview of this ambitious use case....
This paper presents an integrated modeling method providing superior Quality of Service (QoS) for wireless sensor networks\n(WSNs)which is suitable for smart distribution grid (SDG) communication. Traditional QoS model based on IEEE802.15.4 protocol\ncannot meet the communication requirements of multi priority data in smart distribution grid. In order to meet the specification\nof power system communication, a new QoS-enabled medium access control (MAC) model based on unfair competition channel\naccess mechanism (UCCAM) is developed in this paper. The proposed model can ensure that the communication system of WSN\nprovides different Qualities of Service for different priority data. According to different requirements for the communication time,\nthe data of SDG are divided into three types: high priority, middle priority, and low priority data. The state transition of buffering\nqueue data in node is described by a three-dimensional Markov chain model. Delay time, effective throughput rate, and channel\ncollision rate models are developed, respectively, to evaluate communication performance of WSN applied in smart distribution\ngrid.The simulation results show that the proposed model can provide different Qualities of Service for different priority data and\nis more efficient than the IEEE802.15.4e standard and the traditional methods....
Wireless sensor networks are used to monitor physical or environmental conditions. However, authenticating a user or sensor in\nwireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable\ncommunication networks, resource limitation, and unattended operation. As a result, various authentication schemes have been\nproposed to provide secure and efficient communication.He et al. suggested a robust biometrics-based user authentication scheme,\nbut Yoon andKimindicated that their scheme had several security vulnerabilities.The latter then proposed an advanced biometricsbased\nuser authentication scheme; in this paper, we analyze this advanced scheme and performa cryptanalysis. Our analysis shows\nthat Yoon and Kim�s scheme has various security weaknesses such as a biometric recognition error, a user verification problem,\nlack of anonymity and perfect forward secrecy, session key exposure by the gateway node, vulnerability to denial of service attacks,\nand a revocation problem. Therefore, we suggest countermeasures that can be implemented to solve these problems and then\npropose a security-enhanced biometrics-based user authentication scheme using fuzzy extraction that conforms to the proposed\ncountermeasures. Finally, we conduct a security analysis for the proposed biometrics-based user authentication scheme....
In multi sink wireless sensor networks, synchronized data collection among multiple sinks is a significant and challenging task.\nIn this paper, we propose an unbalanced threshold based distributed data collection scheme to reconstruct the synchronized\nsensed data of the whole sensor network in all sinks. The proposed scheme includes the unbalanced threshold based distributed\ntop-|...
Loading....