Pub Date : 2024-02-03DOI: 10.1007/s12243-023-01008-y
Javier Jose Diaz Rivera, Waleed Akbar, Talha Ahmed Khan, Afaq Muhammad, Wang-Cheol Song
In today’s interconnected world, the line that separates the network perimeter can no longer be identified. This has led to the development of Zero Trust Networking (ZTN) and Software Defined Perimeter (SDP) concepts, which aim to extend the perimeter of trust to every entity connected to the network regardless of their physical location. However, implementing complex security mechanisms and constant trust assurance for every interaction can be challenging. One solution is integrating blockchain technology into Zero Trust to provide security. Blockchain offers features such as data decentralization, anonymity, cryptography, and immutable record of transactions that can be utilized. This work proposes a mechanism for secure service session management using blockchain capabilities. Non-fungible tokens (NFT) are applied to access and provider tokens representing a policy agreement for service consumption. These tokens are mapped to the public addresses of entities registered in the blockchain. The proposal is realized through an open-source Zero Trust platform and a private Ethereum blockchain.
{"title":"Zt &t: secure service session management using blockchain-based tokens in zero trust networks.","authors":"Javier Jose Diaz Rivera, Waleed Akbar, Talha Ahmed Khan, Afaq Muhammad, Wang-Cheol Song","doi":"10.1007/s12243-023-01008-y","DOIUrl":"10.1007/s12243-023-01008-y","url":null,"abstract":"<div><p>In today’s interconnected world, the line that separates the network perimeter can no longer be identified. This has led to the development of Zero Trust Networking (ZTN) and Software Defined Perimeter (SDP) concepts, which aim to extend the perimeter of trust to every entity connected to the network regardless of their physical location. However, implementing complex security mechanisms and constant trust assurance for every interaction can be challenging. One solution is integrating blockchain technology into Zero Trust to provide security. Blockchain offers features such as data decentralization, anonymity, cryptography, and immutable record of transactions that can be utilized. This work proposes a mechanism for secure service session management using blockchain capabilities. Non-fungible tokens (NFT) are applied to access and provider tokens representing a policy agreement for service consumption. These tokens are mapped to the public addresses of entities registered in the blockchain. The proposal is realized through an open-source Zero Trust platform and a private Ethereum blockchain.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 7-8","pages":"487 - 505"},"PeriodicalIF":1.8,"publicationDate":"2024-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139668700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-11DOI: 10.1007/s12243-023-01009-x
Juan José López Escobar, Rebeca P. Díaz-Redondo, Felipe Gil-Castiñeira
The advent of new computing and communication trends that link pervasive data sources and consumers, such as Edge Computing, 5G and IIoT, has led to the development of the Cloud-to-Edge Continuum in order to take advantage of the resources available in massive IoT scenarios and to conduct data analysis to leverage intelligence at all levels. This paper outlines the challenging requirements of this novel IoT context and presents an innovative IoT framework to develop dataflow applications for data-centric environments. The proposed design takes advantage of decentralized Pub/Sub communication and serverless nanoservice architecture, using novel technologies such as Zenoh and WebAssembly, respectively, to implement lightweight services along the Cloud-to-Edge infrastructure. We also describe some use cases to illustrate the benefits and concerns of the coming IoT generation, giving a communication performance comparison of Zenoh over brokered MQTT strategies.
{"title":"Unleashing the power of decentralized serverless IoT dataflow architecture for the Cloud-to-Edge Continuum: a performance comparison","authors":"Juan José López Escobar, Rebeca P. Díaz-Redondo, Felipe Gil-Castiñeira","doi":"10.1007/s12243-023-01009-x","DOIUrl":"10.1007/s12243-023-01009-x","url":null,"abstract":"<p>The advent of new computing and communication trends that link pervasive data sources and consumers, such as Edge Computing, 5G and IIoT, has led to the development of the Cloud-to-Edge Continuum in order to take advantage of the resources available in massive IoT scenarios and to conduct data analysis to leverage intelligence at all levels. This paper outlines the challenging requirements of this novel IoT context and presents an innovative IoT framework to develop dataflow applications for data-centric environments. The proposed design takes advantage of decentralized Pub/Sub communication and serverless nanoservice architecture, using novel technologies such as Zenoh and WebAssembly, respectively, to implement lightweight services along the Cloud-to-Edge infrastructure. We also describe some use cases to illustrate the benefits and concerns of the coming IoT generation, giving a communication performance comparison of Zenoh over brokered MQTT strategies.</p>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 3-4","pages":"135 - 148"},"PeriodicalIF":1.8,"publicationDate":"2024-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s12243-023-01009-x.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139438114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-09DOI: 10.1007/s12243-023-01005-1
Nathanael Denis, Sophie Chabridon, Maryline Laurent
The Internet of Things (IoT) is bringing new ways to collect and analyze data to develop applications answering or anticipating users’ needs. These data may be privacy-sensitive, requiring efficient privacy-preserving mechanisms. The IoT is a distributed system of unprecedented scale, creating challenges for performance and security. Classic blockchains could be a solution by providing decentralization and strong security guarantees. However, they are not efficient and scalable enough for large scale IoT systems, and available tools designed for preserving privacy in blockchains, e.g. coin mixing, have a limited effect due to high transaction costs and insufficient transaction rates. This article provides a framework based on several technologies to address the requirements of privacy, security and performance of the Internet of Things. The basis of the framework is the IOTA technology, a derivative of blockchains relying on a directed acyclic graph to create transactions instead of a linear chain. IOTA improves distributed ledger performance by increasing transaction throughput as more users join the network, making the network scalable. As IOTA is not designed for privacy protection, we complement it with privacy-preserving mechanisms: merge avoidance and decentralized mixing. Finally, privacy is reinforced by introducing usage control mechanisms for users to monitor the use and dissemination of their data. A Proof of Concept is proposed to demonstrate the feasibility of the proposed framework. Performance tests are conducted on this Proof of Concept, showing the framework can work on resource-constrained devices and within a reasonable time. The originality of this contribution is also to integrate an IOTA node within the usage control system, to support privacy as close as possible to the objects that need it.
{"title":"Bringing privacy, security and performance to the Internet of Things using IOTA and usage control","authors":"Nathanael Denis, Sophie Chabridon, Maryline Laurent","doi":"10.1007/s12243-023-01005-1","DOIUrl":"10.1007/s12243-023-01005-1","url":null,"abstract":"<div><p>The Internet of Things (IoT) is bringing new ways to collect and analyze data to develop applications answering or anticipating users’ needs. These data may be privacy-sensitive, requiring efficient privacy-preserving mechanisms. The IoT is a distributed system of unprecedented scale, creating challenges for performance and security. Classic blockchains could be a solution by providing decentralization and strong security guarantees. However, they are not efficient and scalable enough for large scale IoT systems, and available tools designed for preserving privacy in blockchains, e.g. coin mixing, have a limited effect due to high transaction costs and insufficient transaction rates. This article provides a framework based on several technologies to address the requirements of privacy, security and performance of the Internet of Things. The basis of the framework is the IOTA technology, a derivative of blockchains relying on a directed acyclic graph to create transactions instead of a linear chain. IOTA improves distributed ledger performance by increasing transaction throughput as more users join the network, making the network scalable. As IOTA is not designed for privacy protection, we complement it with privacy-preserving mechanisms: merge avoidance and decentralized mixing. Finally, privacy is reinforced by introducing usage control mechanisms for users to monitor the use and dissemination of their data. A Proof of Concept is proposed to demonstrate the feasibility of the proposed framework. Performance tests are conducted on this Proof of Concept, showing the framework can work on resource-constrained devices and within a reasonable time. The originality of this contribution is also to integrate an IOTA node within the usage control system, to support privacy as close as possible to the objects that need it.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 7-8","pages":"585 - 601"},"PeriodicalIF":1.8,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139411438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-09DOI: 10.1007/s12243-023-01006-0
Ahmed Zebouchi, Youcef Aklouf
The Internet of Things (IoT) is an emerging technology expected to play a significant role. The integration of IoT with cloud computing (CC) has enabled the creation of large-scale networks of interconnected smart devices and services. To provide optimal quality of service (QoS) for users, it is necessary to address the conflicting requirements of IoT services. The service selection problem is considered NP-hard and therefore requires using metaheuristic algorithms for efficient resolution. This paper presents a novel hybrid multi-objective metaheuristic, pRTMNSGA-III, which combines the strengths of RNSGA-III and TMNSGA-III to generate solutions that meet user preferences and eliminate unfavorable ones. To further optimize computational time, a parallel solution evaluation approach is employed. In addition, a more effective fuzzy membership function is proposed to select the best solution based on the requester’s preferred QoS. The proposed algorithm is evaluated on multiple datasets, and the results demonstrate its superiority over existing state-of-the-art algorithms, including RNSGA-III, TMNSGA-III, NSGA-III, pNSGA-II, NSGA-II, and NSPSO Experimental results demonstrate that pRTMNSGA-III outperforms existing algorithms by up to 37% in terms of the number of non-dominated solutions generated.
{"title":"pRTMNSGA-III: a novel multi-objective algorithm for QoS-aware multi-cloud IoT service selection","authors":"Ahmed Zebouchi, Youcef Aklouf","doi":"10.1007/s12243-023-01006-0","DOIUrl":"10.1007/s12243-023-01006-0","url":null,"abstract":"<div><p>The Internet of Things (IoT) is an emerging technology expected to play a significant role. The integration of IoT with cloud computing (CC) has enabled the creation of large-scale networks of interconnected smart devices and services. To provide optimal quality of service (QoS) for users, it is necessary to address the conflicting requirements of IoT services. The service selection problem is considered NP-hard and therefore requires using metaheuristic algorithms for efficient resolution. This paper presents a novel hybrid multi-objective metaheuristic, pRTMNSGA-III, which combines the strengths of RNSGA-III and TMNSGA-III to generate solutions that meet user preferences and eliminate unfavorable ones. To further optimize computational time, a parallel solution evaluation approach is employed. In addition, a more effective fuzzy membership function is proposed to select the best solution based on the requester’s preferred QoS. The proposed algorithm is evaluated on multiple datasets, and the results demonstrate its superiority over existing state-of-the-art algorithms, including RNSGA-III, TMNSGA-III, NSGA-III, pNSGA-II, NSGA-II, and NSPSO Experimental results demonstrate that pRTMNSGA-III outperforms existing algorithms by up to 37% in terms of the number of non-dominated solutions generated.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 1-2","pages":"17 - 38"},"PeriodicalIF":1.8,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139411442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-08DOI: 10.1007/s12243-023-01007-z
Vuppula Roopa, Himansu Shekhar Pradhan
In this article, we implemented a novel blockchain-oriented RAN (BRAN) by allowing multiple players to trade RAN utilities (such as infrastructure) in terms of virtual network functions (VNFs) that are autonomous and dynamic. Particularly, we designed a multi-player network sharing (MPNS) smart contract which enables the automation of RAN-sharing processes using static or free-marketplace-oriented paradigms. The simulation results, acquired through auction-based and free-marketplace RAN-sharing methods, were evaluated based on user equipment (UE) capacity, UE satisfaction rate, base station (BS) efficiency, and end-to-end latency parameters. These results were then compared to those of the existing static RAN. It is observed from the simulation results that the performance of the blockchain-oriented free-marketplace RAN-sharing mechanism is 35% more efficient in terms of UE capacity and 40.5% more efficient in terms of UE satisfaction rate when compared to existing static RAN with the increase as the number of players in RAN environments. The proposed BRAN paradigm has spacious applications in 6G wireless networks, where user’s security, capacity, satisfaction rate, and latency are crucial constraints.
在本文中,我们实现了一种新颖的面向区块链的 RAN(BRAN),允许多个参与者以自主和动态的虚拟网络功能(VNF)来交易 RAN 实用程序(如基础设施)。特别是,我们设计了一种多玩家网络共享(MPNS)智能合约,它可以使用静态或面向自由市场的模式实现 RAN 共享流程的自动化。我们根据用户设备(UE)容量、UE 满意率、基站(BS)效率和端到端延迟参数,评估了通过基于拍卖和自由市场的 RAN 共享方法获得的模拟结果。然后将这些结果与现有静态 RAN 的结果进行了比较。从仿真结果可以看出,与现有的静态 RAN 相比,随着 RAN 环境中参与者数量的增加,以区块链为导向的自由市场 RAN 共享机制在 UE 容量方面的效率提高了 35%,在 UE 满意率方面的效率提高了 40.5%。所提出的 BRAN 范式在 6G 无线网络中有着广阔的应用前景,因为用户的安全性、容量、满意率和延迟是 6G 无线网络的关键限制因素。
{"title":"Smart contract implementation on network sharing for 6G wireless networks","authors":"Vuppula Roopa, Himansu Shekhar Pradhan","doi":"10.1007/s12243-023-01007-z","DOIUrl":"10.1007/s12243-023-01007-z","url":null,"abstract":"<div><p>In this article, we implemented a novel blockchain-oriented RAN (BRAN) by allowing multiple players to trade RAN utilities (such as infrastructure) in terms of virtual network functions (VNFs) that are autonomous and dynamic. Particularly, we designed a multi-player network sharing (MPNS) smart contract which enables the automation of RAN-sharing processes using static or free-marketplace-oriented paradigms. The simulation results, acquired through auction-based and free-marketplace RAN-sharing methods, were evaluated based on user equipment (UE) capacity, UE satisfaction rate, base station (BS) efficiency, and end-to-end latency parameters. These results were then compared to those of the existing static RAN. It is observed from the simulation results that the performance of the blockchain-oriented free-marketplace RAN-sharing mechanism is 35% more efficient in terms of UE capacity and 40.5% more efficient in terms of UE satisfaction rate when compared to existing static RAN with the increase as the number of players in RAN environments. The proposed BRAN paradigm has spacious applications in 6G wireless networks, where user’s security, capacity, satisfaction rate, and latency are crucial constraints.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 1-2","pages":"39 - 62"},"PeriodicalIF":1.8,"publicationDate":"2024-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139396868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-07DOI: 10.1007/s12243-023-01004-2
Paulo F. C. Barbosa, Bruna A. da Silva, Cleber Zanchettin, Renato M. de Moraes
The traditional methods used to optimize energy efficiency in wireless communication systems employ medium access control (MAC) protocols that operate under complex functions that require a high computational cost to optimize a limited number of parameters. Furthermore, the inability of these methods to work under different protocols that involve learning and adapting the device specifications associated with existing problems, such as security, error tolerance, and human interference, makes their implementation in real systems impractical; this limitation mainly applies to networks with high node scalability. This paper presents a novel approach to this problem using machine learning to attain energy savings. The method proposes combining operating information from multiple power consumption control algorithms, CSMA/CA or slotted ALOHA (a variant of ALOHA), benchmark MAC protocols used in WiFi, and LoRaWAN technologies, creating a database of optimized solutions, which serves as a training base for a neural network capable of learning the behavior of all protocols simultaneously and creating a unified self-adaptive energy optimization model that considers multiple physical (PHY) and MAC layer variables for different devices and protocols. The proposed approach simultaneously presents solutions that optimize the energy reduction algorithms for different protocols, approaching or improving the performance of the techniques, saving 97.6% in CPU computation and 113,322,733% of the processing time in the search for the same solutions. The main contribution of this work is the proposal of an adaptable multi-protocol approach based on machine learning, which manages resources in slotted ALOHA and CSMA/CA benchmark protocols for wireless networks. Furthermore, it facilitates multi-objective optimization via machine learning for energy efficiency in real networks. It creates a new intelligent system that promotes efficient communication for multiple MAC protocols and considers the device’s processing capacity limitation. This work also shows that a neural network can approximate and optimize exact functions when the optimal parameters cannot be mapped mathematically.
用于优化无线通信系统能效的传统方法采用了介质访问控制(MAC)协议,这些协议在复杂的功能下运行,需要很高的计算成本来优化有限的参数。此外,这些方法无法在不同的协议下工作,这些协议涉及学习和调整与现有问题(如安全性、容错性和人为干扰)相关的设备规格,这使得它们在实际系统中的实施不切实际;这种限制主要适用于具有高节点可扩展性的网络。本文针对这一问题提出了一种利用机器学习实现节能的新方法。该方法建议将多种功耗控制算法、CSMA/CA 或槽式 ALOHA(ALOHA 的一种变体)、WiFi 中使用的基准 MAC 协议以及 LoRaWAN 技术的运行信息结合起来,创建一个优化解决方案数据库,作为神经网络的训练基础,该网络能够同时学习所有协议的行为,并创建一个统一的自适应能量优化模型,该模型考虑了不同设备和协议的多个物理(PHY)和 MAC 层变量。所提出的方法同时提出了优化不同协议能量降低算法的解决方案,接近或提高了技术性能,节省了 97.6% 的 CPU 计算量和 113,322,733% 的搜索相同解决方案的处理时间。这项工作的主要贡献在于提出了一种基于机器学习的适应性多协议方法,它能管理无线网络中插槽式 ALOHA 和 CSMA/CA 基准协议的资源。此外,它还通过机器学习促进多目标优化,以提高实际网络的能效。它创建了一个新的智能系统,可促进多种 MAC 协议的高效通信,并考虑设备的处理能力限制。这项工作还表明,当最优参数无法用数学方法映射时,神经网络可以近似和优化精确函数。
{"title":"A multi-protocol energy optimization method for an adaptable wireless MAC system through machine learning","authors":"Paulo F. C. Barbosa, Bruna A. da Silva, Cleber Zanchettin, Renato M. de Moraes","doi":"10.1007/s12243-023-01004-2","DOIUrl":"10.1007/s12243-023-01004-2","url":null,"abstract":"<div><p>The traditional methods used to optimize energy efficiency in wireless communication systems employ medium access control (MAC) protocols that operate under complex functions that require a high computational cost to optimize a limited number of parameters. Furthermore, the inability of these methods to work under different protocols that involve learning and adapting the device specifications associated with existing problems, such as security, error tolerance, and human interference, makes their implementation in real systems impractical; this limitation mainly applies to networks with high node scalability. This paper presents a novel approach to this problem using machine learning to attain energy savings. The method proposes combining operating information from multiple power consumption control algorithms, CSMA/CA or slotted ALOHA (a variant of ALOHA), benchmark MAC protocols used in WiFi, and LoRaWAN technologies, creating a database of optimized solutions, which serves as a training base for a neural network capable of learning the behavior of all protocols simultaneously and creating a unified self-adaptive energy optimization model that considers multiple physical (PHY) and MAC layer variables for different devices and protocols. The proposed approach simultaneously presents solutions that optimize the energy reduction algorithms for different protocols, approaching or improving the performance of the techniques, saving 97.6% in CPU computation and 113,322,733% of the processing time in the search for the same solutions. The main contribution of this work is the proposal of an adaptable multi-protocol approach based on machine learning, which manages resources in slotted ALOHA and CSMA/CA benchmark protocols for wireless networks. Furthermore, it facilitates multi-objective optimization via machine learning for energy efficiency in real networks. It creates a new intelligent system that promotes efficient communication for multiple MAC protocols and considers the device’s processing capacity limitation. This work also shows that a neural network can approximate and optimize exact functions when the optimal parameters cannot be mapped mathematically.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 1-2","pages":"1 - 15"},"PeriodicalIF":1.8,"publicationDate":"2023-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138580729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-06DOI: 10.1007/s12243-023-01001-5
Sunil Sharma, Minakshi Sharma
In this paper, the proposed algorithm based on a novel technique for lowering the Near-Far problem in very high-speed digital subscriber line (VDSL) networks is presented. Through graphical results, it is demonstrated that the proposed technique performs better in terms of data rate for multi-user VDSL networks than the conventional IWF algorithm and comes close to the extremely complex OSB algorithm. The suggested algorithm’s complexity is comparable to that of the standard iterative water filling (IWF) algorithm and significantly less than that of the centralized optimal spectrum balancing (OSB) algorithm.
{"title":"A novel technique to reduce Near-Far problem in multi-user VDSL network","authors":"Sunil Sharma, Minakshi Sharma","doi":"10.1007/s12243-023-01001-5","DOIUrl":"10.1007/s12243-023-01001-5","url":null,"abstract":"<div><p>In this paper, the proposed algorithm based on a novel technique for lowering the Near-Far problem in very high-speed digital subscriber line (VDSL) networks is presented. Through graphical results, it is demonstrated that the proposed technique performs better in terms of data rate for multi-user VDSL networks than the conventional IWF algorithm and comes close to the extremely complex OSB algorithm. The suggested algorithm’s complexity is comparable to that of the standard iterative water filling (IWF) algorithm and significantly less than that of the centralized optimal spectrum balancing (OSB) algorithm.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 7-8","pages":"577 - 584"},"PeriodicalIF":1.8,"publicationDate":"2023-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138493140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-29DOI: 10.1007/s12243-023-01003-3
Mohamed Lahby, Rachid Saadane, Sérgio D. Correia
{"title":"Integration of IoT with cloud computing for next generation wireless technology","authors":"Mohamed Lahby, Rachid Saadane, Sérgio D. Correia","doi":"10.1007/s12243-023-01003-3","DOIUrl":"10.1007/s12243-023-01003-3","url":null,"abstract":"","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"78 11-12","pages":"653 - 654"},"PeriodicalIF":1.9,"publicationDate":"2023-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138491333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-24DOI: 10.1007/s12243-023-01002-4
Arif Basgumus, Fatih Kocak, Mustafa Namdar
In this study, the downlink non-orthogonal multiple access (NOMA) system in which successive interference cancellation (SIC) errors exist is discussed. The new closed-form expressions for the bit error rate (BER) performance analysis over cascaded Nakagami-m fading channels are analytically derived for near and far users. In addition, new mathematical equations are obtained for the asymptotic BER as well as the diversity order to analyze the system performance. The theoretical results precisely match the simulations in all cases, validating the effectiveness of the theoretical analysis. The results demonstrate that the system performance decreases as the degree of N cascading increases. As for a fixed degree of cascading, BER performance increases as the m parameter increases. Moreover, for the power allocation coefficient (alpha ) influences the SIC operation performed on the near user, it also substantially affects the BER performance. Monte Carlo simulations using (10^{6}) iterations are presented to validate the derived analytical results.
{"title":"BER performance analysis for downlink NOMA systems over cascaded Nakagami-m fading channels","authors":"Arif Basgumus, Fatih Kocak, Mustafa Namdar","doi":"10.1007/s12243-023-01002-4","DOIUrl":"10.1007/s12243-023-01002-4","url":null,"abstract":"<div><p>In this study, the downlink non-orthogonal multiple access (NOMA) system in which successive interference cancellation (SIC) errors exist is discussed. The new closed-form expressions for the bit error rate (BER) performance analysis over cascaded Nakagami-<i>m</i> fading channels are analytically derived for near and far users. In addition, new mathematical equations are obtained for the asymptotic BER as well as the diversity order to analyze the system performance. The theoretical results precisely match the simulations in all cases, validating the effectiveness of the theoretical analysis. The results demonstrate that the system performance decreases as the degree of <i>N</i> cascading increases. As for a fixed degree of cascading, BER performance increases as the <i>m</i> parameter increases. Moreover, for the power allocation coefficient <span>(alpha )</span> influences the SIC operation performed on the near user, it also substantially affects the BER performance. Monte Carlo simulations using <span>(10^{6})</span> iterations are presented to validate the derived analytical results.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 5-6","pages":"447 - 453"},"PeriodicalIF":1.8,"publicationDate":"2023-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138503482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-22DOI: 10.1007/s12243-023-00996-1
Ibrahim Sammour, Gerard Chalhoub, Gil De Sousa
Wireless technologies are used in almost every application domain. Applications have different requirements in terms of quality of service and network performance. When designing a wireless network, it is important to know the expected performance of the system. Including the application needs in the design of the network would help achieve the required performance. This paper focuses on the high throughput required for a Smart Farming use case. Multiple-Input Multiple-Output (MIMO) technology had greatly boosted the performance of wireless networks by introducing beamforming, which provides many benefits allowing wider coverage and better data rates. We propose a capacity-aware coverage study for Wi-Fi networks deployment in rural areas. We make our coverage estimations based on link budget calculations. We compare different deployment strategies and discuss the added value of beamforming. Our results are based on an analytical link budget estimation and a simulation study using the NS-3 simulator. We added all the needed functionalities on top of the existing Wi-Fi Module in NS-3. Results in terms of capacity, coverage, and number of access points deployed are discussed. We also developed an empirical analytical model that is based on the simulation results, which helps in estimating performance results for any deployment field size.
{"title":"Capacity aware Wi-Fi networks deployment","authors":"Ibrahim Sammour, Gerard Chalhoub, Gil De Sousa","doi":"10.1007/s12243-023-00996-1","DOIUrl":"10.1007/s12243-023-00996-1","url":null,"abstract":"<div><p>Wireless technologies are used in almost every application domain. Applications have different requirements in terms of quality of service and network performance. When designing a wireless network, it is important to know the expected performance of the system. Including the application needs in the design of the network would help achieve the required performance. This paper focuses on the high throughput required for a Smart Farming use case. Multiple-Input Multiple-Output (MIMO) technology had greatly boosted the performance of wireless networks by introducing beamforming, which provides many benefits allowing wider coverage and better data rates. We propose a capacity-aware coverage study for Wi-Fi networks deployment in rural areas. We make our coverage estimations based on link budget calculations. We compare different deployment strategies and discuss the added value of beamforming. Our results are based on an analytical link budget estimation and a simulation study using the NS-3 simulator. We added all the needed functionalities on top of the existing Wi-Fi Module in NS-3. Results in terms of capacity, coverage, and number of access points deployed are discussed. We also developed an empirical analytical model that is based on the simulation results, which helps in estimating performance results for any deployment field size.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 5-6","pages":"361 - 379"},"PeriodicalIF":1.8,"publicationDate":"2023-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138503481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}