scispace - formally typeset
Search or ask a question

Showing papers in "Computer Communications in 2015"


Journal ArticleDOI
TL;DR: An overview of a novel Wi-Fi technology, currently under development, which aims to organize communication between various devices used in such applications as smart grids, smart meters, smart houses, smart healthcare systems, smart industry, etc.

324 citations


Journal ArticleDOI
TL;DR: The goal is to elaborate on the role of WSNs for smart grid applications and to provide an overview of the most recent advances in MAC and routing protocols for W SNs in this timely and exciting field.

242 citations


Journal ArticleDOI
TL;DR: This article surveys the newer emerging fingerprinting solutions that try to relieve the pre-deployment woes, and identifies some newer performance comparison criteria based on these solutions’ inherent characteristics, and applies them together with the traditional ones in order to evaluate a number of such proposed systems.

162 citations


Journal ArticleDOI
TL;DR: This survey presents many essential research issues about the SDN controller, and especially focus on the control architecture, performance, scalability, placement, interface and security.

124 citations


Journal ArticleDOI
TL;DR: This paper presents an effective detection approach based on CKNN (K-nearest neighbors traffic classification with correlation analysis) to detect DDoS attacks and presents a grid-based method named r-polling method for reducing training data involved in the calculation.

105 citations


Journal ArticleDOI
TL;DR: This survey gives an overview of WSN mechanisms that provide or improve the fault tolerance property of wireless sensor networks and proposes a new classification based on the network size, since the performance of the majority mechanisms depends on the size in terms of geographical area and number of nodes.

102 citations


Journal ArticleDOI
TL;DR: A participant selection scheme to choose the well-suited participants for the sensing task under a fixed task budget and a reputation management scheme to evaluate the trustworthiness and cost performance ratio of mobile users for participant selection are proposed.

94 citations


Journal ArticleDOI
TL;DR: An emerging research direction in the multi-hop ad hoc networking field: people centric networking, triggered by the increasing penetration of the smartphones in everyday life, which is generating a people-centric revolution in computing and communications.

77 citations


Journal ArticleDOI
Alok Tongaonkar1, Ruben Torres1, Marios Iliofotou1, Ram Keralapura1, Antonio Nucci1 
TL;DR: This work presents a novel fully automated packet payload content (PPC) based network traffic classification system that learns new application signatures in the network where classification is desired and adapts the signatures as the traffic for an application changes.

74 citations


Journal ArticleDOI
TL;DR: DBD (Distributed Beaconless Dissemination) uses a backbone-based approach to create and maintain persistent and high quality routes during the video delivery in opportunistic Vehicle to Vehicle (V2V) scenarios and improves the performance of the IEEE 802.11p MAC layer by solving the Spurious Forwarding problem.

64 citations


Journal ArticleDOI
TL;DR: In this article, a fully distributed Demand-Side Management system for smart grid infrastructures, especially tailored to reduce the peak demand of residential users, is proposed, where energy tariffs are function of the overall power demand of customers.

Journal ArticleDOI
TL;DR: Results show that the deployment of few road side units and the use of low complexity routing protocols leads to a significant reduction of cellular resource occupation, even approaching 100% with a high density of equipped vehicles.

Journal ArticleDOI
TL;DR: Considering the moving target scenario of mobile and high definition devices, the text outlines challenges and future research directions that should be considered in the measurement and assessment of the quality of experience for video streaming services.

Journal ArticleDOI
TL;DR: The proposed naming scheme makes the best use of the features offered by hierarchical as well as hash-based or flat naming schemes and is relatively faster and space-efficient than Simple Trie and has better performance compared to the existing solutions of naming the required content.

Journal ArticleDOI
TL;DR: A novel approach based on the idea of cooperative localization is proposed, which incorporates different techniques of localization along with data fusion as well as vehicle-to-vehicle communication, to integrate the available data and cooperatively improve the accuracy of the localization information of the vehicles.

Journal ArticleDOI
TL;DR: An empirical vehicle tracker is employed to measure the effectiveness of a privacy scheme in terms of the amount of confusions and its impact on safety applications, and an obfuscation privacy scheme which perturbs position and beacon frequency is proposed.

Journal ArticleDOI
TL;DR: A novel adaptive system that allows each vehicle to automatically adopt the most suitable dissemination scheme in order to fit the warning message delivery policy to each specific situation, thus mitigating broadcast storms.

Journal ArticleDOI
TL;DR: A simple, modular architecture is outlined to deal with key interoperability questions in heterogeneous wireless networks for smart cities, and the analysis of the reliability on vehicular/mesh networks under jamming attacks is allowed by applying the OLSR and MP-OLSR routing protocols.

Journal ArticleDOI
TL;DR: This work presents an algorithm for deployment of roadside units based on partial mobility information that uses the partition of the road network into same size urban cells, and the migration ratios between adjacent urban cells in order to infer the better locations for the deployment of the roadside units.

Journal ArticleDOI
TL;DR: A vehicular secure and privacy-preserving location-based service (LBS) for value-added applications in VANETs is proposed, which provides authentication, integrity and non-repudiation for both the service provider and the vehicle.

Journal ArticleDOI
TL;DR: The extracted insights from various validated DNS DRDoS case studies lead to a better understanding of the nature and scale of this threat and can generate inferences that could contribute in detecting, preventing, assessing, mitigating and even attributing of DRDoS activities.

Journal ArticleDOI
TL;DR: A distributed learning automata-based method is proposed to find a near optimal solution to the stochastic barrier coverage problem and results show that the proposed algorithm significantly outperforms the greedy based algorithm and optimal method in terms of number of network barrier paths.

Journal ArticleDOI
TL;DR: The potential of spatial Bloom filters in terms of generality, security and compactness makes them ready for deployment, and may open the way for privacy preserving location-aware applications.

Journal ArticleDOI
TL;DR: This paper developed a basic smooth path construction algorithm based on the TSP which allows for faster data collection over the current solutions, which can only accommodate flexible but slower mobile sinks, while maintaining the increased delivery rate and decreased energy usage.

Journal ArticleDOI
TL;DR: This paper proposes GreenRE - a new EAR model with the support of data redundancy elimination (RE), which can virtually increase the capacity of network links and proposes greedy heuristic algorithms for large networks.

Journal ArticleDOI
TL;DR: A metric called Inter-Cover Time (ICT) is proposed to characterize the coverage opportunities and a framework of recruiting vehicles is presented, serving as fundamental guidelines on the coverage measurement and network planning for urban vehicular sensing applications.

Journal ArticleDOI
TL;DR: This paper develops an optimal n-Chunking algorithm with complexity O ( ns 2 ) for an s-byte file, and compares it with ?

Journal ArticleDOI
TL;DR: This work aims to fill gaps by proposing a protocol that provides individual-owner-privacy, based on simple XOR and 128-bit pseudo-random number generators (PRNG), operations that are easily implemented on low-cost RFID tags while meeting the necessary security requirements thus making it a viable option for large scale implementations.

Journal ArticleDOI
TL;DR: A novel utility-based game theoretic framework is proposed towards simultaneously allocating users' uplink transmission power and rate in multi-service two-tier open-access femtocell networks and the existence and uniqueness of UPRA-MSF game's Nash equilibrium is analytically shown.

Journal ArticleDOI
TL;DR: Inclusion of dynamic attributes in smart devices such as unlock failures, application usage, location and proximity of devices can be used to determine the risk level of an end-user and this paper seamlessly incorporate the dynamic attributes to the conventional access control scheme.