• arXiv.cs.NI Pub Date : 2020-11-24
Srinivasan Sridharan

Machine learning (ML) is included in Self-organizing Networks (SONs) that are key drivers for enhancing the Operations, Administration, and Maintenance (OAM) activities. It is included in the 5G Standalone (SA) system is one of the 5G communication tracks that transforms 4G networking to next-generation technology that is based on mobile applications. The research's main aim is to an overview of machine

更新日期：2020-11-25
• arXiv.cs.NI Pub Date : 2020-11-24
Muhammad Atif Ur Rehman; Rehmat Ullah; Byung-Seo Kim; Boubakr Nour; Spyridon Mastorakis

The promising vision of Information-Centric Networking (ICN) and of its realization, Named Data Networking (NDN), has attracted extensive attention in recent years in the context of the Internet of Things (IoT) and Wireless Sensor Networks (WSNs). However, a comprehensive NDN/ICN-based architectural design for WSNs, including specially tailored naming schemes and forwarding mechanisms, has yet to be

更新日期：2020-11-25
• arXiv.cs.NI Pub Date : 2020-11-24
Koen Zandberg; Emmanuel Baccelli

Virtual machines (VM) are widely used to host and isolate software modules. However, extremely small memory and low-energy budgets have so far prevented wide use of VMs on typical microcontroller-based IoT devices. In this paper, we explore the potential of two minimal VM approaches on such low-power hardware. We design rBPF, a register-based VM based on extended Berkeley Packet Filters (eBPF). We

更新日期：2020-11-25
• arXiv.cs.NI Pub Date : 2020-11-24
Silas C. Lobo; Stefan Neumeier; Evelio M. G. Fernandez; Christian Facchi

Vehicular Ad Hoc Networks (VANETs) are expected to be the next big step towards safer road transport, supporting applications to exchange information between vehicles. To develop novel applications for this area a high number of tests, considering all traffic situations, are demanded. However, it is unfeasible to reproduce these tests in real life, by the fact that any failure on the applications would

更新日期：2020-11-25
• arXiv.cs.NI Pub Date : 2020-11-24
Nway Nway Ei; Madyan Alsenwi; Yan Kyaw Tun; Zhu Han; Choong Seon Hong

Unmanned aerial vehicle (UAV)-assisted multi-access edge computing (MEC) has become one promising solution for energy-constrained devices to meet the computation demand and the stringent delay requirement. In this work, we investigate a multiple UAVs-assisted two-stage MEC system in which the computation-intensive and delay-sensitive tasks of mobile devices (MDs) are cooperatively executed on both

更新日期：2020-11-25
• arXiv.cs.NI Pub Date : 2020-11-24
Gabriele Restuccia; Hannes Tschofenig; Emmanuel Baccelli

Similarly to elsewhere on the Internet, practical security in the Internet of Things (IoT) is achieved by combining an array of mechanisms, at work at all layers of the protocol stack, in system software, and in hardware. Standard protocols such as Datagram Transport Layer Security (DTLS 1.2) and Transport Layer Security (TLS 1.2) are often recommended to secure communications to/from IoT devices.

更新日期：2020-11-25
• arXiv.cs.NI Pub Date : 2020-11-23
Yu-Pin Hsu

This letter considers a wireless network where an access point (AP) broadcasts timely updates to several mobile users. The timeliness of information owned by a user is characterized by the recently proposed age of information. While frequently broadcasting the timely updates and always using the maximum power can minimize the age of information for all users, that wastes valuable communication resources

更新日期：2020-11-25
• arXiv.cs.NI Pub Date : 2020-11-22
Jie GaoSherman; Mushu LiSherman; Weihua ZhuangSherman; XueminSherman; Shen; Xu Li

In the second part of this paper, we develop a centralized packet transmission scheduling scheme to pair with the protocol designed in Part I and complete our medium access control (MAC) design for machine-type communications in the industrial internet of things. For the networking scenario, fine-grained scheduling that attends to each device becomes necessary, given stringent quality of service (QoS)

更新日期：2020-11-25
• arXiv.cs.NI Pub Date : 2020-11-22
Jie GaoSherman; Weihua ZhuangSherman; Mushu LiSherman; XueminSherman; Shen; Xu Li

In this two-part paper, we propose a novel medium access control (MAC) protocol for machine-type communications in the industrial internet of things. The considered use case features a limited geographical area and a massive number of devices with sporadic data traffic and different priority types. We target at supporting the devices while satisfying their quality of service (QoS) requirements with

更新日期：2020-11-25
• arXiv.cs.NI Pub Date : 2020-11-22
Mustafa Tosun; Umut Can Cabuk; Vahid Khalilpour Akram; Orhan Dagdeviren

Drone networks are becoming increasingly popular in recent years and they are being used in many applications such as area coverage, delivery systems, military operations, etc. Area coverage is a broad family of applications where a group of connected drones collaboratively visit the whole or parts of an area to fulfill a specific objective and is widely being researched. Accordingly, different mobility

更新日期：2020-11-25
• arXiv.cs.NI Pub Date : 2020-11-22
Meenakshi Syamkumar; Yugali Gullapalli; Wei Tang; Paul Barford; Joel Sommers

This paper describes BigBen, a network telemetry processing system designed to enable accurate and timely reporting of Internet events (e.g., outages, attacks and configuration changes). BigBen is distinct from other Internet-wide event detection systems in its use of passive measurements of Network Time Protocol (NTP) traffic. We describe the architecture of BigBen, which includes (i) a distributed

更新日期：2020-11-25
• arXiv.cs.NI Pub Date : 2020-11-21
Umut Can Cabuk; Vahid Khalilpour Akram; Orhan Dagdeviren

Topology control, including topology construction and maintenance phases, is a vital conception for wireless ad-hoc networks of any kind, expressly the wireless sensor networks (WSN). Topology maintenance, the latter phase, concerns several problems, such as optimizing the energy consumption, increasing the data rate, making clusters, and sustaining the connectivity. A disconnected network, among other

更新日期：2020-11-25
• arXiv.cs.NI Pub Date : 2020-11-21
Zirui Xu; Jinjun Xiong; Fuxun Yu; Xiang Chen

Previous works proved that the combination of the linear neuron network with nonlinear activation functions (e.g. ReLu) can achieve nonlinear function approximation. However, simply widening or deepening the network structure will introduce some training problems. In this work, we are aiming to build a comprehensive second-order CNN implementation framework that includes neuron/network design and system

更新日期：2020-11-25
• arXiv.cs.NI Pub Date : 2020-11-23
Lubomír Bulej; Tomáš Bureš; Adam Filandr; Petr Hnětynka; Iveta Hnětynkova; Jan Pacovský; Gabor Sandor; Ilias Gerostathopoulos

Modern Cyber-physical Systems (CPS) include applications like smart traffic, smart agriculture, smart power grid, etc. Commonly, these systems are distributed and composed of end-user applications and microservices that typically run in the cloud. The connection with the physical world, which is inherent to CPS, brings the need to operate and respond in real-time. As the cloud becomes part of the computation

更新日期：2020-11-25
• arXiv.cs.NI Pub Date : 2020-11-20
Thembelihle Dlamini; Sifiso Vilakati

The massive deployment of small cell Base Stations (SBSs) empowered with computing capabilities presents one of the most ingenious solutions adopted for 5G cellular networks towards meeting the foreseen data explosion and the ultra-low latency demanded by mobile applications. This empowerment of SBSs with Multi-access Edge Computing (MEC) has emerged as a tentative solution to overcome the latency

更新日期：2020-11-25
• arXiv.cs.NI Pub Date : 2020-11-21
Leonid Antsfeld; Boris Chidlovskii; Emilio Sansano-Sansano

We address the indoor localization problem, where the goal is to predict user's trajectory from the data collected by their smartphone, using inertial sensors such as accelerometer, gyroscope and magnetometer, as well as other environment and network sensors such as barometer and WiFi. Our system implements a deep learning based pedestrian dead reckoning (deep PDR) model that provides a high-rate estimation

更新日期：2020-11-25
• arXiv.cs.NI Pub Date : 2020-11-20
Konstantinos Kousias; Apostolos Pappas; Ozgu Alay; Antonios Argyriou; Michael Riegler

Bandwidth forecasting in Mobile Broadband (MBB) networks is a challenging task, particularly when coupled with a degree of mobility. In this work, we introduce HINDSIGHT++, an open-source R-based framework for bandwidth forecasting experimentation in MBB networks with Long Short Term Memory (LSTM) networks. We instrument HINDSIGHT++ following an Automated Machine Learning (AutoML) paradigm to first

更新日期：2020-11-23
• arXiv.cs.NI Pub Date : 2020-11-20
Israa KhaledIMT Atlantique - ELEC, LU; Charlotte LanglaisIMT Atlantique - ELEC; Ammar FalouLU; Bachar ElhassanLU; Michel JezequelIMT Atlantique - ELEC

In millimeter-wave communication, digital beamsteering (DBS), only based on the user direction, is a promising angle-domain multi-antenna technique to mitigate the severe path loss and multiuser interference, with low-complexity and partial channel state information (CSI). In this paper, we design a power-domain non-orthogonal multiple access (NOMA) scheme that enhances the DBS performance trading-off

更新日期：2020-11-23
• arXiv.cs.NI Pub Date : 2020-11-20
Zhuojia Gu; Hancheng Lu; Peilin Hong; Yongdong Zhang

The reliability of current virtual reality (VR) delivery is low due to the limited resources on VR head-mounted displays (HMDs) and the transmission rate bottleneck of sub-6 GHz ($\mu$Wave) networks. In this paper, we propose a dual-connectivity $\mu$Wave-mmWave heterogeneous network architecture empowered by mobile edge capability. The core idea of the proposed architecture is to utilize the complementary

更新日期：2020-11-23
• arXiv.cs.NI Pub Date : 2020-11-19
Elif Ak; Taner Ozdas; Serkan Sevim; Berk Canberk

Content Delivery Network (CDN) has been emerged as a compelling technology to provide efficient and scalable web services even under high client request. However, this leads to a dilemma between minimum deployment cost and robust service under heavy loads. To solve this problem, we propose the Workload Automation Engine (WAE) which enables dynamic resource management, automated scaling and rapid service

更新日期：2020-11-23
• arXiv.cs.NI Pub Date : 2020-11-20
Hang Liu; Xiaojun Yuan; Ying-Jun Angela Zhang

To exploit massive amounts of data generated at mobile edge networks, federated learning (FL) has been proposed as an attractive substitute for centralized machine learning (ML). By collaboratively training a shared learning model at edge devices, FL avoids direct data transmission and thus overcomes high communication latency and privacy issues as compared to centralized ML. To improve the communication

更新日期：2020-11-23
• arXiv.cs.NI Pub Date : 2020-11-19
Sudheesh Singanamalla; Suphanat Chunhapanya; Marek Vavruša; Tanya Verma; Peter Wu; Marwan Fayed; Kurtis Heimerl; Nick Sullivan; Christopher Wood

The Domain Name System (DNS) is the foundation of a human-usable Internet, responding to client queries for host-names with corresponding IP addresses and records. Traditional DNS is also unencrypted, and leaks user information to network operators. Recent efforts to secure DNS using DNS over TLS (DoT) and DNS over HTTPS (DoH) have been gaining traction, ostensibly protecting traffic and hiding content

更新日期：2020-11-23
• arXiv.cs.NI Pub Date : 2020-11-19
Steffen Kaup; André Ludwig; Bogdan Franczyk

Global freight demand will triple between 2015 and 2050, based on the current demand pathway, as predicted in the Transport Outlook 2019. Hence, a revolutionary change in transport efficiency is urgently needed. One approach to tackle this change is to transfer the successful model of the Digital Internet for data exchange to the physical transport of goods: The so-called Physical Internet (PI, or

更新日期：2020-11-21
• arXiv.cs.NI Pub Date : 2020-11-19
Qiyue Li; Tengfei Cao; Wei Sun; Weitao Li

Smart grid is an energy network that integrates advanced power equipment, communication technology and control technology. It can transmit two-way power and data among all components of the grid at the same time. The existing smart grid communication technologies include power line carrier (PLC) com-munication, industrial Ethernet, passive optical networks and wireless communi-cation, each of which

更新日期：2020-11-21
• arXiv.cs.NI Pub Date : 2020-11-19
Pierre Boisrond

The concepts of terminating or not terminating Secure Sockets Layer (SSL) at the load balancer have always generated intriguing conversations. In this paper, the author explains the pros and cons of such concepts in a simplistic manner and also provides suggested recommendations to help organizations understand the security implications associated with unencrypted traffic flowing from the Load Balancer

更新日期：2020-11-21
• arXiv.cs.NI Pub Date : 2020-11-19
Emily Marx; Francis Y. Yan; Keith Winstein

One ABR algorithm implemented on Puffer is BOLA-BASIC, the simplest variant of BOLA. BOLA finds wide use in industry, notably in the MPEG-DASH reference player used as the basis for video players at Akamai, BBC, Orange, and CBS. The overall goal of BOLA is to maximize each encoded chunk's video quality while minimizing rebuffering. To measure video quality, Puffer uses the structural similarity metric

更新日期：2020-11-21
• arXiv.cs.NI Pub Date : 2020-11-19
Adedayo Odesile; Brent Lagesse

Designing security systems for wireless sensor networks presents a challenge due to their relatively low computational resources. This has rendered many traditional defense mechanisms based on cryptography infeasible for deployment on such networks. Reputation and anomaly detection systems have been implemented as viable alternatives, but existing implementations still struggle with providing efficient

更新日期：2020-11-21
• arXiv.cs.NI Pub Date : 2020-11-19
Jernej Hribar; Andrei Marinescu; Alessandro Chiumento; Luiz A. DaSilva

Millions of battery-powered sensors deployed for monitoring purposes in a multitude of scenarios, e.g., agriculture, smart cities, industry, etc., require energy-efficient solutions to prolong their lifetime. When these sensors observe a phenomenon distributed in space and evolving in time, it is expected that collected observations will be correlated in time and space. In this paper, we propose a

更新日期：2020-11-21
• arXiv.cs.NI Pub Date : 2020-11-18
Mohanad Sarhan; Siamak Layeghy; Nour Moustafa; Marius Portmann

Machine Learning (ML)-based Network Intrusion Detection Systems (NIDSs) have proven to become a reliable intelligence tool to protect networks against cyberattacks. Network data features has a great impact on the performances of ML-based NIDSs. However, evaluating ML models often are not reliable, as each ML-enabled NIDS is trained and validated using different data features that may do not contain

更新日期：2020-11-19
• arXiv.cs.NI Pub Date : 2020-11-18
Seyedmohammad Salehi; Abdullah Alnajim; Xiaoqing Zhu; Malcolm Smith; Chien-Chung Shen; Leonard Cimini

Virtual reality (VR) is becoming prevalent with a plethora of applications in education, healthcare, entertainment, etc. To increase the user mobility, and to reduce the energy consumption and production cost of VR head mounted displays (HMDs), wireless VR with edge-computing has been the focus of both industry and academia. However, transferring large video frames of VR applications with their stringent

更新日期：2020-11-19
• arXiv.cs.NI Pub Date : 2020-11-05
Mahdi H. Miraz; Maaruf Ali

Blockchain (BC), a by-product of Bitcoin cryptocurrency, has gained immense and wide scale popularity for its applicability in various diverse domains - especially in multifaceted non-monetary systems. By adopting cryptographic techniques such as hashing and asymmetric encryption - along with distributed consensus approach, a Blockchain based distributed ledger not only becomes highly secure but also

更新日期：2020-11-19
• arXiv.cs.NI Pub Date : 2020-11-18
Levente Csikor; Vipul Ujawane; Dinil Mon Divakaran

Being a crucial part of networked systems, packet classification has to be highly efficient; however, software switches in cloud environments still face performance challenges. The recently proposed Tuple Space Explosion (TSE) attack exploits an algorithmic deficiency in Open vSwitch (OVS). In TSE, legitimate low-rate attack traffic makes the cardinal linear search algorithm in the Tuple Space Search

更新日期：2020-11-19
• arXiv.cs.NI Pub Date : 2020-11-17
Dengke Wang; Marco Giordani; Mohamed-Slim Alouini; Michele Zorzi

6th generation (6G) communication research is currently focusing on non-terrestrial networks (NTNs) to promote ubiquitous and ultra-high-capacity global connectivity. Specifically, multi-layered hierarchical networks, i.e., the orchestration among different aerial/space platforms, including Unmanned Aerial Vehicles (UAVs), High Altitude Platforms (HAPs), and satellites co-operating at different altitudes

更新日期：2020-11-18
• arXiv.cs.NI Pub Date : 2020-11-17
Roman KolcunImperial College London; Diana Andreea PopescuUniversity of Cambridge; Vadim SafronovUniversity of Cambridge; Poonam YadavUniversity of York; Anna Maria MandalariImperial College London; Yiming XieImperial College London; Richard MortierUniversity of Cambridge; Hamed HaddadiImperial College London

Internet-of-Things (IoT) devices are known to be the source of many security problems, and as such they would greatly benefit from automated management. This requires robustly identifying devices so that appropriate network security policies can be applied. We address this challenge by exploring how to accurately identify IoT devices based on their network behavior, using resources available at the

更新日期：2020-11-18
• arXiv.cs.NI Pub Date : 2020-11-17
DongNyeong Heo; Doyoung Lee; Hee-Gon Kim; Suhyun Park; Heeyoul Choi

In the management of computer network systems, the service function chaining (SFC) modules play an important role by generating efficient paths for network traffic through physical servers with virtualized network functions (VNF). To provide the highest quality of services, the SFC module should generate a valid path quickly even in various network topology situations including dynamic VNF resources

更新日期：2020-11-18
• arXiv.cs.NI Pub Date : 2020-11-17
Minoo Hosseinzadeh; Andrew Wachal; Hana Khamfroush; Daniel E. Lucani

With the increasing demand for computationally intensive services like deep learning tasks, emerging distributed computing platforms such as edge computing (EC) systems are becoming more popular. Edge computing systems have shown promising results in terms of latency reduction compared to the traditional cloud systems. However, their limited processing capacity imposes a trade-off between the potential

更新日期：2020-11-18
• arXiv.cs.NI Pub Date : 2020-11-16
Daniel Lindenschmitt; Michael Karrenbauer; Hans D. Schotten

The digitalization of manufacturing processes is leading to a highly increased amount of connected devices. In the course of this development a process was developed and implemented, which optimizes IEEE 802.11-systems relating to the interference situation by using context-information. This was realized by division into two fields. First of all, data providers calculate their own interference situation

更新日期：2020-11-17
• arXiv.cs.NI Pub Date : 2020-11-16
Michael Gundall; Calvin Glas; Hans D. Schotten

The term Industry 4.0, which refers to the fourth industrial revolution, aims at the digitalization of industries, including all kinds of production assets. With the help of these, so-called industrial cyber-physical systems, which form the industrial Internet of Things, numerous novel use cases that are key enabler for a smart manufacturing, can be realized. However, existing facilities mainly consist

更新日期：2020-11-17
• arXiv.cs.NI Pub Date : 2020-11-16
Michael Gundall; Daniel Reti; Hans D. Schotten

Industry 4.0 describes an adaptive and changeable production, where its factory cells have to be reconfigured at very short intervals, e.g. after each workpiece. Furthermore, this scenario cannot be realized with traditional devices, such as programmable logic controllers. Here the use of well-proven technologies of the information technology are conquering the production hall (IT-OT convergence).

更新日期：2020-11-17
• arXiv.cs.NI Pub Date : 2020-11-16
Lamiaa Basyoni; Aiman Erbad; Amr Mohamed; Ahmed Refaey; Mohsen Guizani

The number of users adopting Tor to protect their online privacy is increasing rapidly. With a limited number of volunteered relays in the network, the number of clients' connections sharing the same relays is increasing to the extent that it is starting to affect the performance. Recently, Tor's resource allocation among circuits has been studied as one cause of poor Tor network performance. In this

更新日期：2020-11-17
• arXiv.cs.NI Pub Date : 2020-11-15
Liang Yang; Yin Yang; Daniel Benevides da Costa; Imene Trigui

In this work, the performance of reconfigurable intelligent surface (RIS)-aided communication systems corrupted by the co-channel interference (CCI) at the destination is investigated. Assuming Rayleigh fading and equal-power CCI, we present the analysis for the outage probability (OP), average bit error rate (BER), and ergodic capacity. In addition, an asymptotic outage analysis is carried in order

更新日期：2020-11-17
• arXiv.cs.NI Pub Date : 2020-11-15
Qinzi Zhang; Lewis Tseng

In this paper, we focus on a popular DML framework -- the parameter server computation paradigm and iterative learning algorithms that proceed in rounds. We aim to reduce the communication complexity of Byzantine-tolerant DML algorithms in the single-hop radio network. Inspired by the CGC filter developed by Gupta and Vaidya, PODC 2020, we propose a gradient descent-based algorithm, Echo-CGC. Our main

更新日期：2020-11-17
• arXiv.cs.NI Pub Date : 2020-11-14
Quntao Zhuang; Bingzhi Zhang

Quantum network is the key to enable distributed quantum information processing. As the single-link communication rate decays exponentially with the distance, to enable reliable end-to-end quantum communication, the number of nodes need to grow with the network scale. For highly connected networks, we identify a threshold transition in the capacity as the density of network nodes increases---below

更新日期：2020-11-17
• arXiv.cs.NI Pub Date : 2020-11-14
Pietro Tedeschi; Spiridon Bakiras; Roberto Di Pietro

Contact tracing via mobile applications is gaining significant traction in the battle against Covid-19. A plethora of contact tracing apps have been developed and deployed in several countries around the world. However, people are rightfully concerned about the security and privacy risks of such applications. To this end, the contribution of this work is twofold. First, we present an in-depth analysis

更新日期：2020-11-17
• arXiv.cs.NI Pub Date : 2020-11-14
Canhui Chen; Xu Chen; Jiangshan Yu; Weigang Wu; Di Wu

Temporary fork is a fundamental phenomenon in many blockchains with proof of work, and the analysis of temporary fork has recently drawn great attention. Different from existing efforts that focus on the blockchain system factors such as block size, network propagation delay or block generation speed, in this paper we explore a new key dimension of computing power from the miners' perspective. Specifically

更新日期：2020-11-17
• arXiv.cs.NI Pub Date : 2020-11-13
Sathiya Kumaran Mani; Yi Cao; Paul Barford; Darryl Veitch

High precision, synchronized clocks are essential to a growing number of Internet applications. Standard protocols and their associated server infrastructure have been shown to typically enable client clocks to synchronize on the order of tens of milliseconds. We address one of the key challenges to high precision Internet timekeeping - the intrinsic contribution to clock error of path asymmetry between

更新日期：2020-11-16
• arXiv.cs.NI Pub Date : 2020-11-11
Ishfaq Hussain; Janibul Bashir

Path MTU Discovery (PMTUD) was initially designed for Internet protocol version 4 (IPv4) to prevent the communication loss due to smaller path MTU. This protocol is then further developed for Internet protocol version 6 (IPv6) with new set of constraints. In IPv4 network, the PMTUD activates when the packets DF bit is set, while as in IPv6, PMTUD is always running for every packet. In this paper, we

更新日期：2020-11-16
• arXiv.cs.NI Pub Date : 2020-11-13
Onwuegbuzie Innocent Uzougbo; Samuel-Soma M. Ajibade; Fele Taiwo

Wireless Sensor Network (WSN) is the network of the future. As it gradually gains ground by transforming our lives and environments into a Smart World, it will definitely call for attention from selfish minded Attackers. The first section of this paper introduces the Wireless Sensor Network, its constraints, architecture, and mode of operation. It goes ahead to discuss the applications of WSN in health

更新日期：2020-11-16
• arXiv.cs.NI Pub Date : 2020-11-12
Luis Sequeira; Julian Fernandez-Navajas; Luis Casadesus; Jose Saldana; Idelkys Quintana; Jose Ruiz-Mas

This work presents an analysis of the effect of the access router buffer size on packet loss rate and how it can affect the QoS of multimedia services when bursty traffic is present. VoIP traffic, real traces of viedoconferencing and videosurvellance are used in two different scenarios with medium link utilization. The study shows that the bursty nature of some applications may impair the MOS of voice

更新日期：2020-11-16
• arXiv.cs.NI Pub Date : 2020-11-13
Olakunle Ibitoye; Ashraf Matrawy; M. Omair Shafiq

The proliferation of smart, connected, always listening devices have introduced significant privacy risks to users in a smart home environment. Beyond the notable risk of eavesdropping, intruders can adopt machine learning techniques to infer sensitive information from audio recordings on these devices, resulting in a new dimension of privacy concerns and attack variables to smart home users. Techniques

更新日期：2020-11-16
• arXiv.cs.NI Pub Date : 2020-11-12
Daniel Brennan; Vuk Marojevic

Research conducted in LTE and 5G wireless communications systems uses common off-the-shelf hardware components and commercial software defined radio (SDR) hardware. One of the more popular SDR platforms is the Ettus USRP product line which uses the UHD driver and transport protocol framework. System performance can be increased using kernel bypass frameworks along with UHD. This paper investigates

更新日期：2020-11-13
• arXiv.cs.NI Pub Date : 2020-11-12
Michael Gundall; Christopher Huber; Peter Rost; Ruediger Halfmann; Hans D. Schotten

Industry 4.0 brings up new types of use cases, whereby mobile use cases play a significant role. These use cases have stringent requirements on both automation and communication systems that cannot be achieved with recent shop floor technologies. Therefore, novel technologies such as IEEE time-sensitive networking (TSN) and Open Platform Communications Unified Architecture (OPC UA) are being introduced

更新日期：2020-11-13
• arXiv.cs.NI Pub Date : 2020-11-12
Mahdi Jafari Siavoshani; Amir Hossein Khajepour; Amirmohammad Ziaei; Amir Ali Gatmiri; Ali Taheri

Protecting users' privacy over the Internet is of great importance. However, due to the increasing complexity of network protocols and components, it becomes harder and harder to maintain. Therefore, investigating and understanding how data is leaked from the information transport platform/protocols can lead us to a more secure environment. In this paper, we propose an iterative framework to find the

更新日期：2020-11-13
• arXiv.cs.NI Pub Date : 2020-11-12
Teik Guan Tan; Pawel Szalachowski; Jianying Zhou

The use of passwords and the need to protect passwords are not going away. The majority of websites that require authentication continue to support password authentication. Even high-security applications such as Internet Banking portals, which deploy 2-factor authentication, rely on password authentication as one of the authentication factors. However phishing attacks continue to plague password-based

更新日期：2020-11-13
• arXiv.cs.NI Pub Date : 2020-11-12
Nam H. Chu; Dinh Thai Hoang; Diep N. Nguyen; Nguyen Van Huynh; Eryk Dutkiewicz

Unmanned Aerial Vehicles (UAVs) have been emerging as an effective solution for IoT data collection networks thanks to their outstanding flexibility, mobility, and low operation costs. However, due to the limited energy and uncertainty from the data collection process, speed control is one of the most important factors to optimize the energy usage efficiency and performance for UAV collectors. This

更新日期：2020-11-13
• arXiv.cs.NI Pub Date : 2020-11-11
Luis Sequeira; Julian Fernandez-Navajas; Jose Saldana; Luis Casadesus

All the routers include a buffer in order to enqueue packets waiting to be transmitted. The behaviour of the routers' buffer is of primary importance when studying network traffic, since it may modify some characteristics, as delay or jitter, and may also drop packets. As a consequence, the characterization of this buffer is interesting, especially when real-time flows are being transmitted: if the

更新日期：2020-11-13
• arXiv.cs.NI Pub Date : 2020-11-12
Florian Jacob; Carolin Beer; Norbert Henze; Hannes Hartenstein

Matrix is a new kind of decentralized, topic-based publish-subscribe middleware for communication and data storage that is getting popular particularly as a basis for secure instant messaging. In comparison to traditional decentralized communication systems, Matrix replaces pure message passing with a replicated data structure. This data structure, which we extract and call the Matrix Event Graph (MEG)

更新日期：2020-11-13
• arXiv.cs.NI Pub Date : 2020-11-12
S. Rahimi Kari

Successive Cancellation Decoders have come a long way since the implementation of traditional SC decoders, but there still is a potential for improvement. The main struggle over the years was to find an optimal algorithm to implement them. Most of the proposed algorithms are not practical enough to be implemented in real-life. In this research, we aim to introduce the Efficiency of stochastic neural

更新日期：2020-11-13
• arXiv.cs.NI Pub Date : 2020-11-12
Jianhua Li; Jiong Jin; Lingjuan Lyu; Dong Yuan; Yingying Yang; Longxiang Gao; Chao Shen

Numerous resource-limited smart objects (SOs) such as sensors and actuators have been widely deployed in smart environments, opening new attack surfaces to intruders. The severe security flaw discourages the adoption of the Internet of things in smart living. In this paper, we leverage fog computing and microservice to push certificate authority (CA) functions to the proximity of data sources. Through

更新日期：2020-11-13
• arXiv.cs.NI Pub Date : 2020-11-11
Eugenio Moro; Ilario Filippini

Edge computing has been recently introduced as a way to bring computational capabilities closer to end users of modern network-based services, in order to support existent and future delay-sensitive applications by effectively addressing the high propagation delay issue that affects cloud computing. However, the problem of efficiently and fairly manage the system resources presents particular challenges

更新日期：2020-11-12
Contents have been reproduced by permission of the publishers.

down
wechat
bug