scispace - formally typeset
Search or ask a question
Conference

IFIP Wireless Days 

About: IFIP Wireless Days is an academic conference. The conference publishes majorly in the area(s): Wireless sensor network & Wireless network. Over the lifetime, 620 publications have been published by the conference receiving 6411 citations.

Papers published on a yearly basis

Papers
More filters
Proceedings ArticleDOI
01 Nov 2008
TL;DR: This work proposes a classification and survey the current state-of-art of RFID localization by first presenting this technology and positioning principles, then explains and classify RFid localization techniques.
Abstract: RFID is an automatic identification technology that enables tracking of people and objects. Both identity and location are generally key information for indoor services. An obvious and interesting method to obtain these two types of data is to localize RFID tags attached to devices or objects or carried by people. However, signals in indoor environments are generally harshly impaired and tags have very limited capabilities which pose many challenges for positioning them. In this work, we propose a classification and survey the current state-of-art of RFID localization by first presenting this technology and positioning principles. Then, we explain and classify RFID localization techniques. Finally, we discuss future trends in this domain.

369 citations

Proceedings ArticleDOI
03 Dec 2010
TL;DR: The proposed Content Centric Networking for emergency wireless ad hoc environments is a novel communication architecture capable to access and retrieve content by name and achieves scalability, security, and efficient network resource management in large scale disaster recovery and battlefield networks.
Abstract: Reliable and secure content distribution in a disruptive environment is a critical challenge due to high mobile and lossy channels. Traditional IP networking and wireless protocols tend to perform poorly. In this paper, we propose Content Centric Networking (CCN) for emergency wireless ad hoc environments. CCN is a novel communication architecture capable to access and retrieve content by name. This new approach achieves scalability, security, and efficient network resource management in large scale disaster recovery and battlefield networks. Existing Internet CCN schemes cannot be directly applied to wireless mobile ad hoc networks due to different environments and specific limitations. Thus, we must extend the CCN architecture by introducing features and requirements especially designed for disruptive networks. We prove feasibility and performance gain of the new design via implementation and experimentation.

142 citations

Proceedings ArticleDOI
13 Nov 2013
TL;DR: A protocol that focuses on D2D communications using LTE and WiFi Direct technologies is introduced and it is shown that currently available WiFi Direct features permits to deploy the D1D paradigm on top of the LTE cellular infrastructure, without requiring any fundamental change in LTE protocols.
Abstract: With the evolution of high-performance multi-radio smartphones, Device-to-Device (D2D) communications became an attractive solution for enhancing the performance of cellular networks. Although D2D communications have been widely studied within past few years, the majority of the literature is confined to new theoretical proposals and did not consider implementation challenges. In fact, the implementation feasibility of D2D communications and its challenges are still a relevant research question. In this paper, we introduce a protocol that focuses on D2D communications using LTE and WiFi Direct technologies. We also show that currently available WiFi Direct features permits to deploy the D2D paradigm on top of the LTE cellular infrastructure, without requiring any fundamental change in LTE protocols.

132 citations

Proceedings ArticleDOI
12 Dec 2011
TL;DR: This paper presents two novel RPL attacks of this type: the rank attack and local repair attack, and proposes an IDS architecture using network monitor backbone, and describes its monitoring mechanisms through a RPL finite state machine implemented in each monitor node.
Abstract: This paper focuses on the security aspect of RPL (Routing Protocol for Low-power and lossy network) by introducing a new type of threat — the topology attack, which changes the node operation for breaking the optimised network topology, and designing a specification-based IDS for detecting it. We present two novel RPL attacks of this type: the rank attack and local repair attack. We also propose an IDS architecture using network monitor backbone, and describe its monitoring mechanisms through a RPL finite state machine implemented in each monitor node. We show that our system can effectively detect these routing operation threats with a reasonable overhead.

102 citations

Proceedings ArticleDOI
01 Nov 2012
TL;DR: This work builds a prototype and demonstrates bi-directional data exchange in a network of up to four LEDs, and studies the trade-offs in the system design and measures the achievable bit-rate and transmission distances.
Abstract: Visible Light Communication (VLC) is an emerging technology in which Light Emitting Diodes (LEDs) transport information wirelessly, using the visible light spectrum. While most of the research on VLC has focused on wideband white LEDs used in ambient illumination, narrowband and colored LEDs have received little attention. Short-range free-space optical communication based on narrowband LEDs as visible light transmitters and receivers enable a variety of applications, a scenario we refer as LED-to-LED communication. In this paper, we introduce the communication and networking protocols of LED-to-LED communication. Our work addresses fundamental challenges such as efficient collision detection medium access protocol and elimination of light flicker. We build a prototype and demonstrate bi-directional data exchange in a network of up to four LEDs. We further study the trade-offs in the system design and measure the achievable bit-rate and transmission distances.

101 citations

Performance
Metrics
No. of papers from the Conference in previous years
YearPapers
20211
20192
20176
201616
201462
2013110