Pub Date : 2013-07-03DOI: 10.1109/BlackSeaCom.2013.6623392
Mahbubul Alam, R. Nielsen, N. Prasad
Machine-to-Machine (M2M) communication has attracted considerable attention in research communities and has also started to gain momentum from a commercial perspective where operators are starting to offer services within the domains of fleet management, logistics, home automation, etc. At the same time, the more loosely defined, but broader domain of Internet of Things (IoT) is picking up as what many are seeing as an evolution of M2M. This paper investigates the fundamental differences of M2M and IoT by starting out with surveying some of the drivers and moving into an analysis of M2M of today from a technological and business perspective. The challenges in moving into IoT are investigated with emphasize on networking and computing.
{"title":"The evolution of M2M into IoT","authors":"Mahbubul Alam, R. Nielsen, N. Prasad","doi":"10.1109/BlackSeaCom.2013.6623392","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2013.6623392","url":null,"abstract":"Machine-to-Machine (M2M) communication has attracted considerable attention in research communities and has also started to gain momentum from a commercial perspective where operators are starting to offer services within the domains of fleet management, logistics, home automation, etc. At the same time, the more loosely defined, but broader domain of Internet of Things (IoT) is picking up as what many are seeing as an evolution of M2M. This paper investigates the fundamental differences of M2M and IoT by starting out with surveying some of the drivers and moving into an analysis of M2M of today from a technological and business perspective. The challenges in moving into IoT are investigated with emphasize on networking and computing.","PeriodicalId":170309,"journal":{"name":"2013 First International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122704430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-03DOI: 10.1109/BlackSeaCom.2013.6623382
M. Veletić, I. Balasingham, Z. Babic
The concept of using nanomachines consisting of nanoscale components to have interaction with biological tissues is considered. Bio-inspired approach contributes to the development of nanomachines and systems for specific purposes. It is anticipated that nanonetworks composed of nanomachines can be useful in medical treatment of neuronal impairments. However, interaction between nanodevices and neuronal cells within in-vivo environment is a challenging task. Relying on computational neuroscience, mathematical modeling of neuronal systems and electrical circuit theory, we investigate the neuronal behavior due to injected currents by nanoscale stimulator. Favorable input signal shapes and frequencies are derived and discussed. Furthermore, the investigations on using radio frequency (RF) based signaling and their non-thermal effects are considered to design an interface for nanomachine-to-neuron communication.
{"title":"On spectrum analysis for nanomachine-to-neuron communications","authors":"M. Veletić, I. Balasingham, Z. Babic","doi":"10.1109/BlackSeaCom.2013.6623382","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2013.6623382","url":null,"abstract":"The concept of using nanomachines consisting of nanoscale components to have interaction with biological tissues is considered. Bio-inspired approach contributes to the development of nanomachines and systems for specific purposes. It is anticipated that nanonetworks composed of nanomachines can be useful in medical treatment of neuronal impairments. However, interaction between nanodevices and neuronal cells within in-vivo environment is a challenging task. Relying on computational neuroscience, mathematical modeling of neuronal systems and electrical circuit theory, we investigate the neuronal behavior due to injected currents by nanoscale stimulator. Favorable input signal shapes and frequencies are derived and discussed. Furthermore, the investigations on using radio frequency (RF) based signaling and their non-thermal effects are considered to design an interface for nanomachine-to-neuron communication.","PeriodicalId":170309,"journal":{"name":"2013 First International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131222794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-03DOI: 10.1109/BlackSeaCom.2013.6623404
Recep Talha Kuyuk, H. Çelebi, Ibrahim Hökelek, Ozgur Oren, Ayhan Yeni, Aydin Saribudak, F. Kara, Gokhan Vicil, M. U. Uyar
An interoperability test automation system has been implemented at the Wireless Communication Technologies Research Laboratory (KİTAL) at TÜBİTAK BİLGEM for secure IP communication terminals. Designed and manufactured at BİLGEM, MİLSEC-4 terminals provide VoIP signalling using SIP and end-to-end secure communication using SCIP protocols. This test system, called Shadow Coordinator, aims to verify the interoperability of terminals implementing SCIP, SIP and other related protocols. A simplified EFSM model for the expected behavior of a terminal implementing SCIP is introduced. A more advanced version of this model is used to genearate minimum-length and maximum coverage test sequences.
{"title":"Interoperability of secure VoIP terminals","authors":"Recep Talha Kuyuk, H. Çelebi, Ibrahim Hökelek, Ozgur Oren, Ayhan Yeni, Aydin Saribudak, F. Kara, Gokhan Vicil, M. U. Uyar","doi":"10.1109/BlackSeaCom.2013.6623404","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2013.6623404","url":null,"abstract":"An interoperability test automation system has been implemented at the Wireless Communication Technologies Research Laboratory (KİTAL) at TÜBİTAK BİLGEM for secure IP communication terminals. Designed and manufactured at BİLGEM, MİLSEC-4 terminals provide VoIP signalling using SIP and end-to-end secure communication using SCIP protocols. This test system, called Shadow Coordinator, aims to verify the interoperability of terminals implementing SCIP, SIP and other related protocols. A simplified EFSM model for the expected behavior of a terminal implementing SCIP is introduced. A more advanced version of this model is used to genearate minimum-length and maximum coverage test sequences.","PeriodicalId":170309,"journal":{"name":"2013 First International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124848840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-03DOI: 10.1109/BlackSeaCom.2013.6623391
Sen-Hung Wang, Hsuan-Jung Su, Hung-Yun Hsieh, Shu-ping Yeh, M. Ho
In this paper, we consider the infrastructure mode wireless machine-to-machine (M2M) network, such as the machine-type communication (MTC) in the LTE-Advanced, where there could be tens of thousands of machines within a macro cell and intending to access the same macro base station. Since most of the M2M communications are of low duty cycle and the machine traffic is usually bursty, the bottleneck for M2M communications is usually at the random access stage. In the LTE-Advanced, the access class barring (ACB) and extended access barring (EAB) have been proposed for the random access of MTC. For the one-shot random access attempts which correspond to the extremely low-duty-cycle scenarios where the network has enough time before the next traffic burst to resolve random access collisions, ACB and EAB have been shown to be sufficient if the machines can tolerate long access delay. However, when the machine traffic is recurrent with higher duty cycle, the ACB and EAB will fail to resolve collisions before the next wave of traffic comes in. To accommodate the M2M traffic and reduce the random access delay under limited random access resource, a clustered network structure is considered for which the machines in a macro cell are divided into clusters, and the machines belonging to a cluster communicate to the cluster head which then aggregates the traffic and relays to the macro base station. This clustered M2M network spatially reuses the random access resource. Thus it can increase the number of machines supported by the network and/or reserve more random access resource for the conventional (human) devices such that their qualities of service will not be affected too much by the M2M communications. Our analysis shows that full reuse of the random access resource among the clusters is feasible. In addition, simulations are conducted to study the random access performance of the clustered network, and to determine the number of clusters that should be formed and the number random access preambles that should be allocated to the machines when the total number of machines is given.
在本文中,我们考虑了基础设施模式的无线机器对机器(M2M)网络,如LTE-Advanced中的机器型通信(MTC),其中可能有成千上万的机器在一个宏小区内,并打算访问同一个宏基站。由于大多数M2M通信都是低占空比的,而且机器通信通常是突发的,因此M2M通信的瓶颈通常在随机接入阶段。在LTE-Advanced中,针对MTC的随机接入,提出了ACB (access class blocking)和EAB (extended access blocking)。对于一次性随机访问尝试,对应于极低占空比场景,网络在下一次流量爆发之前有足够的时间来解决随机访问冲突,如果机器能够容忍长访问延迟,则ACB和EAB已被证明是足够的。然而,当机器流量是高占空比的周期性流量时,ACB和EAB将无法在下一波流量到来之前解决冲突。为了在有限的随机接入资源下容纳M2M流量并减少随机接入延迟,考虑了一种集群网络结构,该结构将宏单元中的机器划分为集群,集群中的机器与集群头通信,集群头将流量聚合并中继到宏基站。这种集群M2M网络在空间上重用了随机访问资源。因此,它可以增加网络支持的机器数量和/或为传统(人类)设备保留更多的随机访问资源,使其服务质量不会受到M2M通信的太大影响。分析表明,集群间随机存取资源的充分重用是可行的。此外,通过仿真研究了聚类网络的随机访问性能,确定了在给定机器总数的情况下,应形成的簇数和分配给机器的随机访问序数。
{"title":"Random access design for clustered wireless machine to machine networks","authors":"Sen-Hung Wang, Hsuan-Jung Su, Hung-Yun Hsieh, Shu-ping Yeh, M. Ho","doi":"10.1109/BlackSeaCom.2013.6623391","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2013.6623391","url":null,"abstract":"In this paper, we consider the infrastructure mode wireless machine-to-machine (M2M) network, such as the machine-type communication (MTC) in the LTE-Advanced, where there could be tens of thousands of machines within a macro cell and intending to access the same macro base station. Since most of the M2M communications are of low duty cycle and the machine traffic is usually bursty, the bottleneck for M2M communications is usually at the random access stage. In the LTE-Advanced, the access class barring (ACB) and extended access barring (EAB) have been proposed for the random access of MTC. For the one-shot random access attempts which correspond to the extremely low-duty-cycle scenarios where the network has enough time before the next traffic burst to resolve random access collisions, ACB and EAB have been shown to be sufficient if the machines can tolerate long access delay. However, when the machine traffic is recurrent with higher duty cycle, the ACB and EAB will fail to resolve collisions before the next wave of traffic comes in. To accommodate the M2M traffic and reduce the random access delay under limited random access resource, a clustered network structure is considered for which the machines in a macro cell are divided into clusters, and the machines belonging to a cluster communicate to the cluster head which then aggregates the traffic and relays to the macro base station. This clustered M2M network spatially reuses the random access resource. Thus it can increase the number of machines supported by the network and/or reserve more random access resource for the conventional (human) devices such that their qualities of service will not be affected too much by the M2M communications. Our analysis shows that full reuse of the random access resource among the clusters is feasible. In addition, simulations are conducted to study the random access performance of the clustered network, and to determine the number of clusters that should be formed and the number random access preambles that should be allocated to the machines when the total number of machines is given.","PeriodicalId":170309,"journal":{"name":"2013 First International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128535368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-03DOI: 10.1109/BlackSeaCom.2013.6623410
D. Gregoratti, J. Matamoros
In this paper, a distributed convex optimization framework is developed to manage energy flows between is-landed microgrids. More specifically, the problem consists of two islanded microgrids with the additional capability of selling energy to one another. In order to avoid a central controller and to reduce communications requirements, a subgradient-based cost minimization algorithm is proposed that converges to the centralized solution in a practical number of iterations. Furthermore, this approach allows for a very intuitive, economics interpretation that explains the algorithm iterations in terms of “supply-demand model” and “market clearing”. Finally, numerical results show that microgrid cooperation brings a benefit, both globally (system level) and locally (microgrid level).
{"title":"Distributed convex optimization of energy flows: The two-microgrid case","authors":"D. Gregoratti, J. Matamoros","doi":"10.1109/BlackSeaCom.2013.6623410","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2013.6623410","url":null,"abstract":"In this paper, a distributed convex optimization framework is developed to manage energy flows between is-landed microgrids. More specifically, the problem consists of two islanded microgrids with the additional capability of selling energy to one another. In order to avoid a central controller and to reduce communications requirements, a subgradient-based cost minimization algorithm is proposed that converges to the centralized solution in a practical number of iterations. Furthermore, this approach allows for a very intuitive, economics interpretation that explains the algorithm iterations in terms of “supply-demand model” and “market clearing”. Finally, numerical results show that microgrid cooperation brings a benefit, both globally (system level) and locally (microgrid level).","PeriodicalId":170309,"journal":{"name":"2013 First International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133626602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-03DOI: 10.1109/BlackSeaCom.2013.6623376
M. D. Felice, L. Bedogni, A. Trotta, L. Bononi, F. Panzieri, G. Ruggeri, G. Aloi, V. Loscrí, P. Pace
Spontaneous networks among end-user devices (e.g, smartphones, tablets) can guarantee emergency communication in post-disaster scenarios where the original infrastructure has been partially damaged by the occurrence of unpredictable or catastrophic events. However, the heterogeneity of devices and wireless access technologies poses important challenges on the network deployment and management. In this paper, we propose the STEM-Net architecture as a viable network model to handle the devices' heterogeneity and to enable spontaneous networking functionalities in post-disaster scenarios. In STEM· Net, the wireless devices - called Stem Nodes (SN) - are able to adapt their transmitting configurations, cover different roles (e.g. router, bridge, etc) according to the system needs and evolve their functionalities through cooperation with other nodes. Here, we provide a proof-of-concept of the principles of nodes' mutation and evolution, by discussing how heterogeneous end-user devices provided with SN capabilities can dynamically self-organize into multi-hop networks, and share the Internet access by switching among three roles: stub, transit and gateway SNs. A bio-inspired distributed gateway selection mode is proposed to allow each SN device to decide its current role, based on the system needs and on the individual hardware characteristics and resources (e.g residual energy or queue occupation). The simulation analysis conducted with the Omnet++ tool demonstrates the effectiveness of the STEM-Net framework in prolonging the network lifetime while providing adequate bandwidth for emergency communication to the end-users devices.
{"title":"Smartphones like stem cells: Cooperation and evolution for emergency communication in post-disaster scenarios","authors":"M. D. Felice, L. Bedogni, A. Trotta, L. Bononi, F. Panzieri, G. Ruggeri, G. Aloi, V. Loscrí, P. Pace","doi":"10.1109/BlackSeaCom.2013.6623376","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2013.6623376","url":null,"abstract":"Spontaneous networks among end-user devices (e.g, smartphones, tablets) can guarantee emergency communication in post-disaster scenarios where the original infrastructure has been partially damaged by the occurrence of unpredictable or catastrophic events. However, the heterogeneity of devices and wireless access technologies poses important challenges on the network deployment and management. In this paper, we propose the STEM-Net architecture as a viable network model to handle the devices' heterogeneity and to enable spontaneous networking functionalities in post-disaster scenarios. In STEM· Net, the wireless devices - called Stem Nodes (SN) - are able to adapt their transmitting configurations, cover different roles (e.g. router, bridge, etc) according to the system needs and evolve their functionalities through cooperation with other nodes. Here, we provide a proof-of-concept of the principles of nodes' mutation and evolution, by discussing how heterogeneous end-user devices provided with SN capabilities can dynamically self-organize into multi-hop networks, and share the Internet access by switching among three roles: stub, transit and gateway SNs. A bio-inspired distributed gateway selection mode is proposed to allow each SN device to decide its current role, based on the system needs and on the individual hardware characteristics and resources (e.g residual energy or queue occupation). The simulation analysis conducted with the Omnet++ tool demonstrates the effectiveness of the STEM-Net framework in prolonging the network lifetime while providing adequate bandwidth for emergency communication to the end-users devices.","PeriodicalId":170309,"journal":{"name":"2013 First International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"29 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128801053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-03DOI: 10.1109/BlackSeaCom.2013.6623403
Zemre Arslan, Arda Alemdaroglu, B. Canberk
The tremendous increase in the mobile traffic requirements and the growing demands of large scale Cloud data centers have lead the network administrators to seek new management approaches. The Software Defined Networks (SDN) has raised as a promising solution providing more effective, programmable and granular configurations in order to isolate all the dynamic traffic requirements and spiky changes in the physical topological status of the networks from the network management. In this paper, we propose a novel SDN Controller which classifies the network traffic types according to the heterogeneous Quality of Service requirements that the network data is separated into the Constant Bit Rate (CBR) based realtime traffic and File Transfer Protocol (FTP) based non-real time traffic. Some crucial traffic flow parameters such as packet delivery ratio, routing overhead and delay are also considered in this classification. A novel protocol header is also generated by the proposed SDN controller in order to disseminate the necessary information through the L2/L3 switches in the Data Plane. This header is composed of the Parameter, Rule, Controller Action subfields. The proposed SDN controller decides the most effective network deployment strategy, i.e. either becoming an ad-hoc or being centralized, using the traffic types, network parameters and the header information. A detailed performance evaluation is provided which indicates the efficiency of the proposed SDN controller while deciding necessary deployment considering the heterogeneous traffic types as well as the increased number of users in the topology.
{"title":"A traffic-aware controller design for next generation software defined networks","authors":"Zemre Arslan, Arda Alemdaroglu, B. Canberk","doi":"10.1109/BlackSeaCom.2013.6623403","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2013.6623403","url":null,"abstract":"The tremendous increase in the mobile traffic requirements and the growing demands of large scale Cloud data centers have lead the network administrators to seek new management approaches. The Software Defined Networks (SDN) has raised as a promising solution providing more effective, programmable and granular configurations in order to isolate all the dynamic traffic requirements and spiky changes in the physical topological status of the networks from the network management. In this paper, we propose a novel SDN Controller which classifies the network traffic types according to the heterogeneous Quality of Service requirements that the network data is separated into the Constant Bit Rate (CBR) based realtime traffic and File Transfer Protocol (FTP) based non-real time traffic. Some crucial traffic flow parameters such as packet delivery ratio, routing overhead and delay are also considered in this classification. A novel protocol header is also generated by the proposed SDN controller in order to disseminate the necessary information through the L2/L3 switches in the Data Plane. This header is composed of the Parameter, Rule, Controller Action subfields. The proposed SDN controller decides the most effective network deployment strategy, i.e. either becoming an ad-hoc or being centralized, using the traffic types, network parameters and the header information. A detailed performance evaluation is provided which indicates the efficiency of the proposed SDN controller while deciding necessary deployment considering the heterogeneous traffic types as well as the increased number of users in the topology.","PeriodicalId":170309,"journal":{"name":"2013 First International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"05 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130952076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-03DOI: 10.1109/BlackSeaCom.2013.6623388
Zih-Siang Syu, Chia-han Lee
Device-to-device (D2D) communication has recently been considered as an efficient way to offload the cellular traffic by allowing user equipments (UEs) to have direct communication via the licensed spectrum. In this paper, we study the fundamental constraints of maximally allowed density and communication distance of D2D devices. The locations of D2D devices are modeled by a Poisson point process (PPP) and the tools from stochastic geometry are applied for network analysis. Scenarios involving infinite and finite coverage area and exclusion region are investigated.
{"title":"Spatial constraints of device-to-device communications","authors":"Zih-Siang Syu, Chia-han Lee","doi":"10.1109/BlackSeaCom.2013.6623388","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2013.6623388","url":null,"abstract":"Device-to-device (D2D) communication has recently been considered as an efficient way to offload the cellular traffic by allowing user equipments (UEs) to have direct communication via the licensed spectrum. In this paper, we study the fundamental constraints of maximally allowed density and communication distance of D2D devices. The locations of D2D devices are modeled by a Poisson point process (PPP) and the tools from stochastic geometry are applied for network analysis. Scenarios involving infinite and finite coverage area and exclusion region are investigated.","PeriodicalId":170309,"journal":{"name":"2013 First International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134328236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-03DOI: 10.1109/BlackSeaCom.2013.6623378
Merve Sahin, A. Levi
Key distribution is an important issue to provide security in Wireless Sensor Networks (WSNs). Many of the key pre-distribution schemes proposed for static WSNs perform poorly when they are applied to Mobile Wireless Sensor Networks (MWSNs). In this paper, we propose Dynamic Key Ring Update (DKRU) mechanism for MWSNs. The aim of DKRU mechanism is to enable sensor nodes to update their key rings periodically during movement, by observing the frequent keys in their neighbors. Our mechanism can be used together with different key pre-distribution schemes and it helps to increase the performance of them. For the performance evaluation basis, we used our mechanism together with a location based key pre-distribution scheme. Our results show that DKRU mechanism increases the local and global connectivity when it is applied to MWSNs. Moreover, our mechanism does not cause a significant degradation in network resiliency.
{"title":"Dynamic key ring update mechanism for Mobile Wireless Sensor Networks","authors":"Merve Sahin, A. Levi","doi":"10.1109/BlackSeaCom.2013.6623378","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2013.6623378","url":null,"abstract":"Key distribution is an important issue to provide security in Wireless Sensor Networks (WSNs). Many of the key pre-distribution schemes proposed for static WSNs perform poorly when they are applied to Mobile Wireless Sensor Networks (MWSNs). In this paper, we propose Dynamic Key Ring Update (DKRU) mechanism for MWSNs. The aim of DKRU mechanism is to enable sensor nodes to update their key rings periodically during movement, by observing the frequent keys in their neighbors. Our mechanism can be used together with different key pre-distribution schemes and it helps to increase the performance of them. For the performance evaluation basis, we used our mechanism together with a location based key pre-distribution scheme. Our results show that DKRU mechanism increases the local and global connectivity when it is applied to MWSNs. Moreover, our mechanism does not cause a significant degradation in network resiliency.","PeriodicalId":170309,"journal":{"name":"2013 First International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133627163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-03DOI: 10.1109/BlackSeaCom.2013.6623381
L. Felicetti, M. Femminella, G. Reali
In this paper we propose a solution for transmitting digital information within the cardiocirculatory system. In particular, we make use of a channel delivering burst of molecules, emitted by mobile transmitters, which diffuse in the blood towards fixed receivers, that are attached to the vessel walls. This communication scheme has been inspired by the real signaling between platelets and endothelial cells, the behavior of which has been investigated experimentally. We thus believe that our proposal can be successfully deployed in living bodies. On the basis of the results achieved through simulations on the communication system capabilities, we propose a simple but effective receiver scheme, and we outline the future research directions.
{"title":"Establishing digital molecular communications in blood vessels","authors":"L. Felicetti, M. Femminella, G. Reali","doi":"10.1109/BlackSeaCom.2013.6623381","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2013.6623381","url":null,"abstract":"In this paper we propose a solution for transmitting digital information within the cardiocirculatory system. In particular, we make use of a channel delivering burst of molecules, emitted by mobile transmitters, which diffuse in the blood towards fixed receivers, that are attached to the vessel walls. This communication scheme has been inspired by the real signaling between platelets and endothelial cells, the behavior of which has been investigated experimentally. We thus believe that our proposal can be successfully deployed in living bodies. On the basis of the results achieved through simulations on the communication system capabilities, we propose a simple but effective receiver scheme, and we outline the future research directions.","PeriodicalId":170309,"journal":{"name":"2013 First International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116489376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}