Latest in cs.ni

total 9319took 0.12s
Online Reinforcement Learning of X-Haul Content Delivery Mode in Fog Radio Access NetworksMar 18 2019We consider a Fog Radio Access Network (F-RAN) with a Base Band Unit (BBU) in the cloud and multiple cache-enabled enhanced Remote Radio Heads (eRRHs). The system aims at delivering contents on demand with minimal average latency from a time-varying library ... More
Grid Computing Model for Mobile: A Better Mobile Grid Computing ModelMar 15 2019Grid Computing is an idea of a new kind of network technology in which research work in progress. There is a great deal of hype in this technology based area for that reason it is getting a great deal of attention of the computing community. Grid Computing ... More
Impact of Traffic Characteristics on Request Aggregation in an NDN RouterMar 15 2019The paper revisits the performance evaluation of caching in a Named Data Networking (NDN) router where the content store (CS) is supplemented by a pending interest table (PIT). The PIT aggregates requests for a given content that arrive within the download ... More
Time Reversal based MAC for Multi-Hop Underwater Acoustic NetworksMar 15 2019Constrained-energy underwater acoustic nodes are typically connected via a multi-hop underwater acoustic network (MHUAN) to cover a broad marine region. Recently, protocols for efficiently connecting such nodes have received considerable attention. In ... More
Using Machine Learning and Big Data Analytics to Prioritize Outpatients in HetNetsMar 14 2019In this paper, we introduce machine learning approaches that are used to prioritize outpatients (OP) according to their current health state, resulting in self-optimizing heterogeneous networks (HetNet) that intelligently adapt according to users' needs. ... More
Exploiting Information Centric Networking to federate NoSQL Spatial DatabasesMar 14 2019This paper explores methodologies, challenges and expected advantages related to the use of the Information Centric Network (ICN) technology for federating NoSQL databases. ICN services allow simplifying the design of federation procedures, improving ... More
ETGuard: Detecting D2D Attacks using Wireless Evil TwinsMar 14 2019In this paper, we demonstrate a realistic variant of wireless Evil Twins (ETs) for launching device to device (D2D) attacks over the network, particularly for Android. We show an attack where an ET infects an Android device before the relay of network ... More
FAVE: A fast and efficient network Flow AVailability Estimation method with bounded relative errorMar 14 2019This paper focuses on helping network providers to carry out network capacity planning and sales projection by answering the question: For a given topology and capacity, whether the network can serve current flow demands with high probabilities? We name ... More
Cardinality Estimation in a Virtualized Network Device Using Online Machine LearningMar 13 2019Cardinality estimation algorithms receive a stream of elements, with possible repetitions, and return the number of distinct elements in the stream. Such algorithms seek to minimize the required memory and CPU resource consumption at the price of inaccuracy ... More
Node Centrality Metrics for Hotspots Analysis in Telecom Big DataMar 13 2019In this work, we are interested in the applications of big data in the telecommunication domain, analysing two weeks of datasets provided by Telecom Italia for Milan and Trento. Our objective is to identify hotspots which are places with very high communication ... More
Crowdsourced wireless spectrum anomaly detectionMar 13 2019Automated wireless spectrum monitoring across frequency, time and space will be essential for many future applications. Manual and fine-grained spectrum analysis is becoming impossible because of the large number of measurement locations and complexity ... More
Six Key Enablers for Machine Type Communication in 6GMar 13 2019While 5G is being rolled out in different parts of the globe, few research groups around the world $-$ such as the Finnish 6G Flagship program $-$ have already started posing the question: \textit{What will 6G be?} The 6G vision is a data-driven society, ... More
Lost Silence: An emergency response early detection service through continuous processing of telecommunication data streamsMar 13 2019Early detection of significant traumatic events, e.g. a terrorist attack or a ship capsizing, is important to ensure that a prompt emergency response can occur. In the modern world telecommunication systems could play a key role in ensuring a successful ... More
Security, Privacy and Trust for Smart Mobile-Internet of Things (M-IoT): A SurveyMar 13 2019With an enormous range of applications, Internet of Things (IoT) has magnetized industries and academicians from everywhere. IoT facilitates operations through ubiquitous connectivity by providing Internet access to all the devices with computing capabilities. ... More
Age-of-Information vs. Value-of-Information Scheduling for Cellular Networked Control SystemsMar 13 2019Age-of-Information (AoI) is a recently introduced metric for network operation with sensor applications which quantifies the freshness of data. In the context of networked control systems (NCSs), we compare the worth of the AoI metric with the value-of-information ... More
Age of Information in a Multiple Access Channel with Heterogeneous Traffic and an Energy Harvesting NodeMar 12 2019Age of Information (AoI) is a newly appeared concept and metric to characterize the freshness of data. In this work, we study the delay and AoI in a multiple access channel (MAC) with two source nodes transmitting different types of data to a common destination. ... More
Big Data Goes Small: Real-Time Spectrum-Driven Embedded Wireless Networking Through Deep Learning in the RF LoopMar 12 2019The explosion of 5G networks and the Internet of Things will result in an exceptionally crowded RF environment, where techniques such as spectrum sharing and dynamic spectrum access will become essential components of the wireless communication process. ... More
Narrowband IoT: An Appropriate Solution for Developing CountriesMar 12 2019Internet of things (IoT) is very much attractive for several sensor based applications. It provides large coverage of the services with small amount of resources. Its applications span from the ordinary scenarios such as sensing in the common digital ... More
Satellite Based IoT for MC ApplicationsMar 12 2019In the recent years, world has witnessed the ubiquitous applications of Internet of things (IoT) for many different scenarios. There are several critical applications where the results are essential and the mission has to be successful at any cost. Such ... More
Communication Bandwidth for Emerging Networks: Trends and ProspectsMar 12 2019Bandwidth is one of the essential resources for communication. Due to the emergence of large number of new services in different types of communications and their value added entities, the demand for bandwidth has gone up more than ever before. The Internet ... More
Service Capacity Enhanced Task Offloading and Resource Allocation in Multi-Server Edge Computing EnvironmentMar 12 2019An edge computing environment features multiple edge servers and multiple service clients. In this environment, mobile service providers can offload client-side computation tasks from service clients' devices onto edge servers to reduce service latency ... More
Evaluating Modern GPU Interconnect: PCIe, NVLink, NV-SLI, NVSwitch and GPUDirectMar 11 2019High performance multi-GPU computing becomes an inevitable trend due to the ever-increasing demand on computation capability in emerging domains such as deep learning, big data and planet-scale simulations. However, the lack of deep understanding on how ... More
A Quantum Router for the Entangled WebMar 11 2019Qubit transmission protocols are presently point-to-point, and thus restrictive in their functionality. A quantum router is necessary for the quantum Internet to become a reality. We present a quantum router design based on teleportation, as well as mechanisms ... More
Transmit Antenna Selection for Massive MIMO-GSM with Machine LearningMar 11 2019A dynamic and flexible generalized spatial modulation (GSM) framework is proposed for massive MIMO systems. Our framework is leveraged on the utilization of machine learning methods for GSM in order to improve the error performance in presence of correlated ... More
Performance Evaluation of a Quantum Entanglement SwitchMar 11 2019We study a quantum entanglement switch that serves $k$ users in a star topology. We model variants of the system using Markov chains and standard queueing theory and obtain expressions for switch capacity and the expected number of qubits stored in memory ... More
LTE and Millimeter Waves for V2I Communications: an End-to-End Performance ComparisonMar 11 2019The Long Term Evolution (LTE) standard enables, besides cellular connectivity, basic automotive services to promote road safety through vehicle-to-infrastructure (V2I) communications. Nevertheless, stakeholders and research institutions, driven by the ... More
State machine inference of QUICMar 11 2019QUIC is a recent transport protocol that provides reliable, secure and quick service on top of UDP in the internet. As QUIC is implemented in the application space rather than in the operating system's kernel, it is more efficient to dynamically develop ... More
Hashtag Usage in a Geographically-Local Microblogging AppMar 11 2019This paper studies for the first time the usage and propagation of hashtags in a new and fundamentally different type of social media that is i) without profiles and ii) location-based to only show nearby posted content. Our study is based on analyzing ... More
A Deep Learning Based Resource Allocation Scheme in Vehicular Communication SystemsMar 10 2019In vehicular communications, intracell interference and the stringent latency requirement are challenging issues. In this paper, a joint spectrum reuse and power allocation problem is formulated for hybrid vehicle-to-vehicle (V2V) and vehicle-to-infrastructure ... More
A Motivational Game-Theoretic Approach for Peer-to-Peer Energy Trading in the Smart GridMar 10 2019Peer-to-peer trading in energy networks is expected to be exclusively conducted by the prosumers of the network with negligible influence from the grid. This raises the critical question: how can enough prosumers be encouraged to participate in peer-to-peer ... More
Fifty Shades of Congestion Control: A Performance and Interactions EvaluationMar 09 2019Congestion control algorithms are crucial in achieving high utilization while preventing overloading the network. Over the years, many different congestion control algorithms have been developed, each trying to improve in specific situations. However, ... More
Control over Skies: Survivability, Coverage and Mobility Laws for Hierarchical Aerial Base StationsMar 09 2019Aerial Base Stations (ABSs) have gained significant importance in the next generation of wireless networks for accommodating mobile ground users and flash crowds with high convenience and quality. However, to achieve an efficient ABS network, many factors ... More
Primary User Emulation Attacks: A Detection Technique Based on Kalman FilterMar 08 2019Cognitive radio technology addresses the problem of spectrum scarcity by allowing secondary users to use the vacant spectrum bands without causing interference to the primary users. However, several attacks could disturb the normal functioning of the ... More
Improving Device-Edge Cooperative Inference of Deep Learning via 2-Step PruningMar 08 2019Deep neural networks (DNNs) are state-of-the-art solutions for many machine learning applications, and have been widely used on mobile devices. Running DNNs on resource-constrained mobile devices often requires the help from edge servers via computation ... More
Enhancing REST HTTP with Random Linear Network Coding in Dynamic Edge Computing EnvironmentsMar 08 2019The rising number of IoT devices is accelerating the research on new solutions that will be able to efficiently deal with unreliable connectivity in highly dynamic computing applications. To improve the overall performance in IoT applications, there are ... More
Hybrid Heterogeneous Routing Scheme for Improved Network Performance in WSNs for Animal TrackingMar 07 2019Wireless Sensor Networks (WSNs) experiences several technical challenges such as limited energy, short transmission range, limited storage capacities, and limited computational capabilities. Moreover, the sensor nodes are deployed randomly and massively ... More
Real-Time Experimental Demonstration of Multi-band CAP Modulation in a VLC System with Off-the-Shelf LEDsMar 07 2019We demonstrate, for the first time, m-CAP modulation using off-the-shelf LEDs in a VLC in real time experimental setup using field programmable gate arrays based in universal software radio peripherals (USRPs). We demonstrate transmission speeds up to ... More
Allocation of Computation-Intensive Graph Jobs over Vehicular CloudsMar 07 2019Recent years have witnessed dramatic growth in smart vehicles and computation-intensive jobs, which pose new challenges to the provision of efficient services related to the internet of vehicles. Graph jobs, in which computations are represented by graphs ... More
Energy Efficient Optimization of Wireless-powered 5G Full Duplex Cellular Networks: A Mean Field Game ApproachMar 07 2019This paper studies the power allocation of an ultra-dense cellular network consisting of multiple full-duplex (FD) base stations (BSs) serving a large number of half-duplex (HD) user equipments (UEs) located in a wide geographical area. Each BS consists ... More
Individual Preference Aware Caching Policy Design in Wireless D2D NetworksMar 07 2019Cache-aided wireless device-to-device (D2D) networks allow significant throughput increase, depending on the concentration of the popularity distribution of files. While many previous investigations assumed that all users have the same preference, this ... More
HRSON: Home-based Routing for Smartphones in Opportunistic NetworksMar 06 2019Opportunistic networks are delay-tolerant networks which enable network connectivity while there is limited access to network infrastructure, such as natural disaster happenings. Since opportunistic networks use store-carry-forward mechanism to deliver ... More
Softpressure: A Schedule-Driven Backpressure Algorithm for Coping with Network CongestionMar 06 2019We consider the problem of minimizing the delay of jobs moving through a directed graph of service nodes. In this problem, each node may have several links and is constrained to serve one link at a time. As jobs move through the network, they can pass ... More
WiFi-Based Indoor Localization via Multi-Band Splicing and Phase RetrievalMar 06 2019We study the problem of indoor localization using commodity WiFi channel state information (CSI) measurements. The accuracy of methods developed to address this problem is limited by the overall bandwidth used by the WiFi device as well as various types ... More
Distributed Policy Learning Based Random Access for Diversified QoS RequirementsMar 06 2019Future wireless access networks need to support diversified quality of service (QoS) metrics required by various types of Internet-of-Things (IoT) devices, e.g., age of information (AoI) for status generating sources and ultra low latency for safety information ... More
Resource Allocation for Device-to-Device Communications in Multi-Cell Multi-Band Heterogeneous Cellular NetworksMar 06 2019Heterogeneous cellular networks (HCNs) with millimeter wave (mm-wave) communications are considered as a promising technology for the fifth generation mobile networks. Mm-wave has the potential to provide multiple gigabit data rate due to the broad spectrum. ... More
Ultra-Reliable Low-Latency Communications in Autonomous Vehicular NetworksMar 05 2019Autonomous vehicles are expected to emerge as a main trend in vehicle development over the next decade. To support autonomous vehicles, ultra-reliable low-latency communications (URLLC) is required between autonomous vehicles and infrastructure networks, ... More
Towards Skewness and Balancing of RPL Trees for the Internet of ThingsMar 05 2019In many application areas such as large-scale disaster detection, IoT networks connote the characteristics of LLN (Low power and Lossy Network). With few exceptions, prior work on RPL(Routing Protocol for LLN), a standard routing protocol standardized ... More
Communication Aspects of the Integration of Wireless IoT Devices with Distributed Ledger TechnologyMar 05 2019The pervasive need to safely share and store information between devices calls for the replacement of centralized trust architectures with the decentralized ones. Distributed Ledger Technologies (DLTs) are seen as the most promising enabler of decentralized ... More
Distributed Cooperative Caching for VoD with Geographic ConstraintsMar 05 2019We consider caching of video streams in a cellular network in which each base station is equipped with a cache. Video streams are partitioned into multiple substreams and the goal is to place substreams in caches such that the residual backhaul load is ... More
Improving the Survivability of Clustered Interdependent Networks by Restructuring DependenciesMar 04 2019The interdependency between different network layers is commonly observed in Cyber Physical Systems and communication networks adopting the dissociation of logic and hardware implementation, such as Software Defined Networking and Network Function Virtualization. ... More
Unlicensed Spectrum Sharing for Massive Internet-of-Things CommunicationsMar 04 2019The unlicensed spectrum, although free, has become an invaluable resource toward enabling massive Internet-of-things (IoT) applications, where Internet-enabled devices are deployed at a large scale. However, realizing massive IoT connectivity over unlicensed ... More
Interference Avoidance Position Planning in UAV-assisted Wireless CommunicationMar 04 2019We consider unmanned aerial vehicle (UAV)-assisted wireless communication employing UAVs as relay nodes to increase the throughput between a pair of transmitter and receiver. We focus on developing effective methods to position the UAV(s) in the sky in ... More
Interference Avoidance Position Planning in UAV-assisted Wireless CommunicationMar 04 2019Mar 05 2019We consider unmanned aerial vehicle (UAV)-assisted wireless communication employing UAVs as relay nodes to increase the throughput between a pair of transmitter and receiver. We focus on developing effective methods to position the UAV(s) in the sky in ... More
Trust Evaluation Mechanism for User Recruitment in Mobile Crowd-Sensing in the Internet of ThingsMar 04 2019Mobile Crowd-Sensing (MCS) has appeared as a prospective solution for large-scale data collection, leveraging built-in sensors and social applications in mobile devices that enables a variety of Internet of Things (IoT) services. However, the human involvement ... More
Agile Data Offloading over Novel Fog Computing Infrastructure for CAVsMar 04 2019Future Connected and Automated Vehicles (CAVs) will be supervised by cloud-based systems overseeing the overall security and orchestrating traffic flows. Such systems rely on data collected from CAVs across the whole city operational area. This paper ... More
Efficient Millimeter-Wave Infrastructure Placement for City-Scale ITSMar 04 2019Millimeter Waves (mmWaves) will play a pivotal role in the next-generation of Intelligent Transportation Systems (ITSs). However, in deep urban environments, sensitivity to blockages creates the need for more sophisticated network planning. In this paper, ... More
Secure Data Offloading Strategy for Connected and Autonomous VehiclesMar 04 2019Connected and Automated Vehicles (CAVs) are expected to constantly interact with a network of processing nodes installed in secure cabinets located at the side of the road -- thus, forming Fog Computing-based infrastructure for Intelligent Transportation ... More
Designing Optimal Multiplex Networks for Certain Laplacian Spectral PropertiesMar 04 2019We discuss the design of interlayer edges in a multiplex network, under a limited budget, with the goal of improving its overall performance. We analyze the following three problems separately; first, we maximize the smallest nonzero eigenvalue, also ... More
Practical Prediction of Human Movements Across Device Types and Spatiotemporal GranularitiesMar 03 2019Understanding and predicting mobility are essential for the design and evaluation of future mobile edge caching and networking. Consequently, research on prediction of human mobility has drawn significant attention in the last decade. Employing information-theoretic ... More
Socially-Aware Congestion Control in Ad-Hoc Networks: Current Status and The Way ForwardMar 03 2019Ad-hoc social networks (ASNETs) represent a special type of traditional ad-hoc network in which a user's social properties (such as the social connections and communications metadata as well as application data) are leveraged for offering enhanced services ... More
A survey of security and privacy issues in the Internet of Things from the layered contextMar 03 2019Internet of Things (IoT) is a novel paradigm, which not only facilitates a large number of devices to be ubiquitously connected over the Internet but also provides a mechanism to remotely control these devices. The IoT is pervasive and is almost an integral ... More
Agile Network Access Control in the Container AgeMar 02 2019Linux Containers, such as those managed by Docker, are an increasingly popular way to package and deploy complex applications. However, the fundamental security primitive of network access control for a distributed microservice deployment is often ignored ... More
Design and Validation of a Bluetooth 5 Fog Computing Based Industrial CPS Architecture for Intelligent Industry 4.0 Shipyard WorkshopsMar 02 2019Navantia, one of Europe's largest shipbuilders, is creating a fog computing-based Industrial Cyber-Physical System (ICPS) for remote monitoring in real-time of their pipe workshops. Such a monitoring process, which involves pipe traceability and tracking, ... More
Bounded Dijkstra (BD): Search Space Reduction for Expediting Shortest Path SubroutinesMar 01 2019The shortest path (SP) and shortest paths tree (SPT) problems arise both as direct applications and as subroutines of overlay algorithms solving more complex problems such as the constrained shortest path (CSP) or the constrained minimum Steiner tree ... More
Bounded Dijkstra (BD): Search Space Reduction for Expediting Shortest Path SubroutinesMar 01 2019Mar 06 2019The shortest path (SP) and shortest paths tree (SPT) problems arise both as direct applications and as subroutines of overlay algorithms solving more complex problems such as the constrained shortest path (CSP) or the constrained minimum Steiner tree ... More
Urban Vibes and Rural Charms: Analysis of Geographic Diversity in Mobile Service Usage at National ScaleMar 01 2019We investigate spatial patterns in mobile service consumption that emerge at national scale. Our investigation focuses on a representative case study, i.e., France, where we find that: (i) the demand for popular mobile services is fairly uniform across ... More
Improved queue-size scaling for input-queued switches via graph factorizationMar 01 2019This paper studies the scaling of the expected total queue size in an $n\times n$ input-queued switch, as a function of both the load $\rho$ and the system scale $n$. We provide a new class of scheduling policies under which the expected total queue size ... More
Detecting Target-Area Link-Flooding DDoS Attacks using Traffic Analysis and Supervised LearningMar 01 2019A novel class of extreme link-flooding DDoS (Distributed Denial of Service) attacks is designed to cut off entire geographical areas such as cities and even countries from the Internet by simultaneously targeting a selected set of network links. The Crossfire ... More
Cyber-physical risks of hacked Internet-connected vehiclesFeb 28 2019The integration of automotive technology with Internet-connectivity promises to both dramatically improve transportation, while simultaneously introducing the potential for new unknown risks. Internet-connected vehicles are like digital data because they ... More
Monitoring as a Service of the cloud data centre: can SDNs help?Feb 28 2019The recent rise of cloud applications, representinglarge complex modern distributed services, has made perfor-mance monitoring a major issue and a critical process for bothcloud providers and cloud customers. Many different monitoringtechniques are used ... More
Constrained Thompson Sampling for Wireless Link OptimizationFeb 28 2019Wireless communication systems operate in complex time-varying environments. Therefore, selecting the optimal configuration parameters in these systems is a challenging problem. For wireless links, rate selection is used to select the optimal data transmission ... More
Big Data for Traffic Monitoring and ManagementFeb 28 2019The last two decades witnessed tremendous advances in the Information and Communications Technologies. Beside improvements in computational power and storage capacity, communication networks carry nowadays an amount of data which was not envisaged only ... More
Markov Decision Policies for Dynamic Video Delivery in Wireless Caching NetworksFeb 28 2019This paper proposes a video delivery strategy for dynamic streaming services which maximizes time-average streaming quality under a playback delay constraint in wireless caching networks. The network where popular videos encoded by scalable video coding ... More
IoT Virtualization: A Survey of Software Definition & Function Virtualization Techniques for Internet of ThingsFeb 28 2019Internet of Things (IoT) and Network Softwarization are fast becoming core technologies of information systems and network management for next generation Internet. The deployment and applications of IoT ranges from smart cities to urban computing, and ... More
Security Function Analysis on Performance of High-Speed Router NetworkingFeb 27 2019A router is a device, in the computer networks, that is used to forward a data packet. Because of its function, the router becomes an important role in measuring the performance of computer networks. It needs to process the incoming data packets with ... More
An Investigation of Performance versus Security in Cognitive Radio Networks with Supporting Cloud PlatformsFeb 27 2019The growth of wireless devices affects the availability of limited frequencies or spectrum bands as it has been known that spectrum bands are a natural resource that cannot be added. Meanwhile, the licensed frequencies are idle most of the time. Cognitive ... More
S-PRAC: Fast Partial Packet Recovery with Network Coding in Very Noisy Wireless ChannelsFeb 27 2019Well-known error detection and correction solutions in wireless communications are slow or incur high transmission overhead. Recently, notable solutions like PRAC and DAPRAC, implementing partial packet recovery with network coding, could address these ... More
Upper-Confidence Bound for Channel Selection in LPWA Networks with RetransmissionsFeb 27 2019In this paper, we propose and evaluate different learning strategies based on Multi-Arm Bandit (MAB) algorithms. They allow Internet of Things (IoT) devices to improve their access to the network and their autonomy, while taking into account the impact ... More
Distributed Edge Caching via Reinforcement Learning in Fog Radio Access NetworksFeb 27 2019In this paper, the distributed edge caching problem in fog radio access networks (F-RANs) is investigated. By considering the unknown spatio-temporal content popularity and user preference, a user request model based on hidden Markov process is proposed ... More
BlendMAS: A BLockchain-ENabled Decentralized Microservices Architecture for Smart Public SafetyFeb 27 2019Thanks to rapid technological advances in the Internet of Things (IoT), a smart public safety (SPS) system has become feasible by integrating heterogeneous computing devices to collaboratively provide public protection services. While a service oriented ... More
Interference Management in NOMA-based Fog-Radio Access Networks via Joint Scheduling and Power AdaptationFeb 27 2019Non-Orthogonal Multiple Access (NOMA) and Fog Radio Access Networks (FRAN) are promising candidates within the 5G and beyond systems. This work examines the benefit of adopting NOMA in an FRAN architecture with constrained capacity fronthaul. The paper ... More
Neural Packet ClassificationFeb 27 2019Packet classification is a fundamental problem in computer networking. This problem exposes a hard tradeoff between the computation and state complexity, which makes it particularly challenging. To navigate this tradeoff, existing solutions rely on complex ... More
Multiple Constrained Routing Algorithms in Large-Scaled Software Defined NetworksFeb 27 2019In this paper, we consider the bandwidth-delay-hop constrained routing problem in large-scaled software defined networks. A number of demands, each of which specifies a source vertex and a sink vertex, are required to route in a given network. We are ... More
A Vision of 6G Wireless Systems: Applications, Trends, Technologies, and Open Research ProblemsFeb 26 2019The ongoing deployment of 5G cellular systems is continuously exposing the inherent limitations of this system, compared to its original premise as an enabler for Internet of Everything applications. These 5G drawbacks are currently spurring worldwide ... More
The Attack of the Clones against Proof-of-AuthorityFeb 26 2019In this paper, we explore vulnerabilities and countermeasures of the recently proposed blockchain consensus based on proof-of-authority. The proof-of-work blockchains, like Bitcoin and Ethereum, have been shown both theoretically and empirically vulnerable ... More
Blockchain and its Role in the Internet of Things (IoT)Feb 26 2019Blockchain (BC) in the Internet of Things (IoT) is a novel technology that acts with decentralized, distributed, public and real-time ledger to store transactions among IoT nodes. A blockchain is a series of blocks, each block is linked to its previous ... More
Middleware Implementation in Cloud-MANET Mobility Model for Internet of Smart DevicesFeb 26 2019The smart devices are extremely useful devices that are making our lives easier than before. A smart device is facilitated us to establish a connection with another smart device in a wireless network with a decentralized approach. The mobile ad hoc network ... More
NAC: Automating Access Control via Named DataFeb 26 2019In this paper we present the design of Name-based Access Control (NAC) scheme, which supports data confidentiality and access control in Named Data Networking (NDN) architecture by encrypting content at the time of production, and by automating the distribution ... More
Optimal and Fast Real-time Resources Slicing with Deep Dueling Neural NetworksFeb 26 2019Effective network slicing requires an infrastructure/network provider to deal with the uncertain demand and real-time dynamics of network resource requests. Another challenge is the combinatorial optimization of numerous resources, e.g., radio, computing, ... More
Decimeter Ranging with Channel State InformationFeb 25 2019This paper aims at the problem of time-of-flight (ToF) estimation using channel state information (CSI) obtainable from commercialized MIMO-OFDM WLAN receivers. It was often claimed that the CSI phase is contaminated with errors of known and unknown natures ... More
Network Service Dependencies in Commodity Internet-of-Things DevicesFeb 25 2019We continue to see increasingly widespread deployment of IoT devices, with apparent intent to embed them in our built environment likely to accelerate if smart city and related programmes succeed. In this paper we are concerned with the ways in which ... More
A game-theoretic analysis of DoS attacks on driverless vehiclesFeb 25 2019Driverless vehicles are expected to form the foundation of future connected transport infrastructure. A key weakness of connected vehicles is their vulnerability to physical-proximity attacks such as sensor saturation attacks. It is natural to study whether ... More
Tile-Based Joint Caching and Delivery of $360^o$ Videos in Heterogeneous NetworksFeb 25 2019The recent surge of applications involving the use of $360^o$ video challenges mobile networks infrastructure, as $360^o$ video files are of significant size, and current delivery and edge caching architectures are unable to guarantee their timely delivery. ... More
Edge Federation: Towards an Integrated Service Provisioning ModelFeb 25 2019Edge computing is a promising computing paradigm for pushing the cloud service to the network edge. To this end, edge infrastructure providers (EIPs) need to bring computation and storage resources to the network edge and allow edge service providers ... More
Expect More from the Networking: DDoS Mitigation by FITT in Named Data NetworkingFeb 24 2019Distributed Denial of Service (DDoS) attacks have plagued the Internet for decades, but defenses have not fundamentally outpaced attackers. Instead, the size and rate of growth in attacks have actually outpaced carriers' and DDoS mitigation services' ... More
A Review of Routing Protocol Selection for Wireless Sensor Networks in Smart CitiesFeb 24 2019Today, the advancements in urban technology have transformed into the concept of smart cities. These smart cities are envisioned to be heavily dependent on wireless sensor networks and internet of things. In this context, a number of routing protocols ... More
EUI-64 Considered HarmfulFeb 24 2019This position paper considers the privacy and security implications of EUI-64-based IPv6 addresses. By encoding MAC addresses, EUI-64 addresses violate layers by exposing hardware identifiers in IPv6 addresses. The hypothetical threat of EUI-64 addresses ... More
Demystifying TCP Initial Window Configurations of Content Distribution NetworksFeb 24 2019Driven by their quest to improve web performance, Content Delivery Networks (CDNs) are known adaptors of performance optimizations. In this regard, TCP congestion control and particularly its initial congestion window (IW) size is one long-debated topic ... More
An SDN-Based Transmission Protocol with In-Path Packet Caching and RetransmissionFeb 22 2019In this paper, a comprehensive software-defined networking (SDN) based transmission protocol (SDTP) is presented for fifth generation (5G) communication networks, where an SDN controller gathers network state information from the physical network to improve ... More
Hybrid-Vehfog: A Robust Approach for Reliable Dissemination of Critical Messages in Connected VehiclesFeb 22 2019Vehicular Ad-hoc Networks (VANET) enable efficient communication between vehicles with the aim of improving road safety. However, the growing number of vehicles in dense regions and obstacle shadowing regions like Manhattan and other downtown areas leads ... More