scispace - formally typeset
Search or ask a question

Showing papers on "Communications protocol published in 2016"


Proceedings Article
05 Dec 2016
TL;DR: A simple neural model is explored, called CommNet, that uses continuous communication for fully cooperative tasks and the ability of the agents to learn to communicate amongst themselves is demonstrated, yielding improved performance over non-communicative agents and baselines.
Abstract: Many tasks in AI require the collaboration of multiple agents. Typically, the communication protocol between agents is manually specified and not altered during training. In this paper we explore a simple neural model, called CommNet, that uses continuous communication for fully cooperative tasks. The model consists of multiple agents and the communication between them is learned alongside their policy. We apply this model to a diverse set of tasks, demonstrating the ability of the agents to learn to communicate amongst themselves, yielding improved performance over non-communicative agents and baselines. In some cases, it is possible to interpret the language devised by the agents, revealing simple but effective strategies for solving the task at hand.

804 citations


Journal ArticleDOI
22 Jul 2016-Sensors
TL;DR: The experimental results showed that the Internet technologies and Smart Object Communication Patterns can be combined to encourage development of Precision Agriculture, and demonstrated added benefits (cost, energy, smart developing, acceptance by agricultural specialists) when a project is launched.
Abstract: The application of Information Technologies into Precision Agriculture methods has clear benefits. Precision Agriculture optimises production efficiency, increases quality, minimises environmental impact and reduces the use of resources (energy, water); however, there are different barriers that have delayed its wide development. Some of these main barriers are expensive equipment, the difficulty to operate and maintain and the standard for sensor networks are still under development. Nowadays, new technological development in embedded devices (hardware and communication protocols), the evolution of Internet technologies (Internet of Things) and ubiquitous computing (Ubiquitous Sensor Networks) allow developing less expensive systems, easier to control, install and maintain, using standard protocols with low-power consumption. This work develops and test a low-cost sensor/actuator network platform, based in Internet of Things, integrating machine-to-machine and human-machine-interface protocols. Edge computing uses this multi-protocol approach to develop control processes on Precision Agriculture scenarios. A greenhouse with hydroponic crop production was developed and tested using Ubiquitous Sensor Network monitoring and edge control on Internet of Things paradigm. The experimental results showed that the Internet technologies and Smart Object Communication Patterns can be combined to encourage development of Precision Agriculture. They demonstrated added benefits (cost, energy, smart developing, acceptance by agricultural specialists) when a project is launched.

168 citations


Journal ArticleDOI
TL;DR: A novel concept—IoRT is presented that highlights architectural principles, vital characteristics, as well as research challenges of this term to provide a better understanding of the architectural assimilation of IoRT and identify important research directions on this term.
Abstract: Internet of Things allow massive number of uniquely addressable “things” to communicate with each other and transfer data over existing internet or compatible network protocols. This paper proposes a new concept which tackles the issues for supporting control and monitoring activities at deployment sites and industrial automations, where intelligent things can monitor peripheral events, induce sensor data acquired from a variety of sources, use ad hoc, local, and distributed “machine intelligence” to determine appropriate course of actions, and then act to control or disseminate static or dynamic position aware robotic things in the physical world through a seamless manner by providing a means for utilizing them as Internet of robotic things (IoRT). Although progressive advancements can be seen in multi-robotic systems, robots are constantly getting enriched by easier developmental functionalities, such vertical robotic service centric silos are not enough for continuously and seamlessly supporting for which they are meant. In this paper, a novel concept-IoRT is presented that highlights architectural principles, vital characteristics, as well as research challenges. The aim of this paper is to provide a better understanding of the architectural assimilation of IoRT and identify important research directions on this term.

166 citations


Proceedings ArticleDOI
22 Aug 2016
TL;DR: PISCES is a software switch derived from Open vSwitch (OVS), a hard-wired hypervisor switch whose behavior is customized using P4, and it is shown how the compiler can analyze the high-level specification to optimize forwarding performance.
Abstract: Hypervisors use software switches to steer packets to and from virtual machines (VMs). These switches frequently need upgrading and customization—to support new protocol headers or encapsulations for tunneling and overlays, to improve measurement and debugging features, and even to add middlebox-like functions. Software switches are typically based on a large body of code, including kernel code, and changing the switch is a formidable undertaking requiring domain mastery of network protocol design and developing, testing, and maintaining a large, complex codebase. Changing how a software switch forwards packets should not require intimate knowledge of its implementation. Instead, it should be possible to specify how packets are processed and forwarded in a high-level domain-specific language (DSL) such as P4, and compiled to run on a software switch. We present PISCES, a software switch derived from Open vSwitch (OVS), a hard-wired hypervisor switch, whose behavior is customized using P4. PISCES is not hard-wired to specific protocols; this independence makes it easy to add new features. We also show how the compiler can analyze the high-level specification to optimize forwarding performance. Our evaluation shows that PISCES performs comparably to OVS and that PISCES programs are about 40 times shorter than equivalent changes to OVS source code.

165 citations


Journal ArticleDOI
TL;DR: A novel consensus-based vehicle control algorithm for the CDS is designed, in which not only the local traffic flow stability is guaranteed, but also the shock waves are supposed to be smoothed, and the efficiency of the proposed scheme is shown.
Abstract: Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication are emerging components of intelligent transport systems (ITS) based on which vehicles can drive in a cooperative way and, hence, significantly improve traffic flow efficiency. However, due to the high vehicle mobility, the unreliable vehicular communications such as packet loss and transmission delay can impair the performance of the cooperative driving system (CDS). In addition, the downstream traffic information collected by roadside sensors in the V2I communication may introduce measurement errors, which also affect the performance of the CDS. The goal of this paper is to bridge the gap between traffic flow modelling and communication approaches in order to build up better cooperative traffic systems. To this end, we aim to develop an enhanced cooperative microscopic (car-following) traffic model considering V2V and V2I communication (or V2X for short), and investigate how vehicular communications affect the vehicle cooperative driving, especially in traffic disturbance scenarios. For these purposes, we design a novel consensus-based vehicle control algorithm for the CDS, in which not only the local traffic flow stability is guaranteed, but also the shock waves are supposed to be smoothed. The IEEE 802.11p, the defacto vehicular networking standard, is selected as the communication protocols, and the roadside sensors are deployed to collect the average speed in the targeted area as the downstream traffic reference. Specifically, the imperfections of vehicular communication as well as the measured information noise are taken into account. Numerical results show the efficiency of the proposed scheme. This paper attempts to theoretically investigate the relationship between vehicular communications and cooperative driving, which is needed for the future deployment of both connected vehicles and infrastructure (i.e. V2X).

162 citations


Journal ArticleDOI
TL;DR: The aim of the problem addressed is to design a set-membership filter capable of confining the state estimate of the system to certain ellipsoidal region subject to the bounded non-Gaussian noises.

149 citations


Journal ArticleDOI
TL;DR: A review of integral components of the emerging grid and communication infrastructures enabling the six smart grid applications is presented and the need for convergence into a common protocol platform to achieve interoperability of legacy and evolving communication protocols is highlighted.

118 citations


Journal ArticleDOI
01 Apr 2016
TL;DR: This paper proposes a communication architecture for BANs, and designs a scheme to secure the data communications between implanted/wearable sensors and the data sink/data consumers (doctors or nurse) by employing Ciphertext-Policy Attribute Based Encryption (CP_ABE) and signature to store the data in ciphertext format at theData sink, hence ensuring data security.
Abstract: Wireless Body Area Networks (WBANs) are expected to play a major role in the field of patient-health monitoring in the near future, which gains tremendous attention amongst researchers in recent years. One of the challenges is to establish a secure communication architecture between sensors and users, whilst addressing the prevalent security and privacy concerns. In this paper, we propose a communication architecture for BANs, and design a scheme to secure the data communications between implanted/wearable sensors and the data sink/data consumers (doctors or nurse) by employing Ciphertext-Policy Attribute Based Encryption (CP_ABE) [1] and signature to store the data in ciphertext format at the data sink, hence ensuring data security. Our scheme achieves a role-based access control by employing an access control tree defined by the attributes of the data. We also design two protocols to securely retrieve the sensitive data from a BAN and instruct the sensors in a BAN. We analyze the proposed scheme, and argue that it provides message authenticity and collusion resistance, and is efficient and feasible. We also evaluate its performance in terms of energy consumption and communication/computation overhead.

111 citations


Journal ArticleDOI
TL;DR: This work encompasses the complete solution, a cyber-physical system, starting from the physical level, consisting of sensors and the communication protocol, and reaching data management and storage at the cyber level.
Abstract: This paper presents the development of a cyber-physical system that monitors the environmental conditions or the ambient conditions in indoor spaces at remote locations. The communication between the system’s components is performed using the existent wireless infrastructure based on the IEEE 802.11 b/g standards. The resulted solution provides the possibility of logging measurements from locations all over the world and of visualizing and analyzing the gathered data from any device connected to the Internet. This work encompasses the complete solution, a cyber-physical system, starting from the physical level, consisting of sensors and the communication protocol, and reaching data management and storage at the cyber level. The experimental results show that the proposed system represents a viable and straightforward solution for environmental and ambient monitoring applications.

83 citations


Journal ArticleDOI
TL;DR: An online monitoring system based on an IoT system architecture which is composed of four layers which integrates various data processing techniques including protocol conversion, data filtering, and data conversion is presented.
Abstract: Monitoring solutions using the Internet of Things (IoT) techniques, can continuously gather sensory data, such as temperature and pressure, and provide abundant information for a monitoring center. Nevertheless, the heterogeneous and massive data bring significant challenges to real-time monitoring and decision making, particularly in time-sensitive industrial environments. This paper presents an online monitoring system based on an IoT system architecture which is composed of four layers: 1) sensing; 2) network; 3) service resource; and 4) application layers. It integrates various data processing techniques including protocol conversion, data filtering, and data conversion. The proposed system has been implemented and demonstrated through a real continuous steel casting production line, and integrated with the TeamCenter platform. Results indicate that the proposed solution well addresses the challenge of heterogeneous data and multiple communication protocols in real-world industrial environments.

82 citations


Proceedings ArticleDOI
17 Jul 2016
TL;DR: This work proposes lightweight session programming in Scala, leveraging the native features of the Scala type system and standard library to introduce a representation of session types as Scala types, and introduces a library with a convenient API for session-based programming, supporting local and distributed communication.
Abstract: Designing, developing and maintaining concurrent applications is an error-prone and time-consuming task; most difficulties arise because compilers are usually unable to check whether the inputs/outputs performed by a program at runtime will adhere to a given protocol specification. To address this problem, we propose lightweight session programming in Scala: we leverage the native features of the Scala type system and standard library, to introduce (1) a representation of session types as Scala types, and (2) a library, called lchannels, with a convenient API for session-based programming, supporting local and distributed communication. We generalise the idea of Continuation-Passing Style Protocols (CPSPs), studying their formal relationship with session types. We illustrate how session programming can be carried over in Scala: how to formalise a communication protocol, and represent it using Scala classes and lchannels, letting the compiler help spotting protocol violations. We attest the practicality of our approach with a complex use case, and evaluate the performance of lchannels with a series of benchmarks.

Journal ArticleDOI
TL;DR: The challenges within the cross-functional domains of the power and communication systems that current research aims to overcome are identified and recommendations are provided for diverse new and innovative traffic features.

Journal ArticleDOI
TL;DR: Experimental results on BitTorrent, CIFS/SMB, DNS, FTP, PPLIVE, SIP, and SMTP traces show that Securitas has the ability to accurately identify the network traces of the target application protocol with an average recall and an average precision of about 98.4%.
Abstract: Traffic classification, a mapping of traffic to network applications, is important for a variety of networking and security issues, such as network measurement, network monitoring, as well as the detection of malware activities. In this paper, we propose Securitas, a network trace-based protocol identification system, which exploits the semantic information in protocol message formats. Securitas requires no prior knowledge of protocol specifications. Deeming a protocol as a language between two processes, our approach is based upon the new insight that the n-grams of protocol traces, just like those of natural languages, exhibit highly skewed frequency-rank distribution that can be leveraged in the context of protocol identification. In Securitas, we first extract the statistical protocol message formats by clustering n-grams with the same semantics, and then use the corresponding statistical formats to classify raw network traces. Our tool involves the following key features: 1) applicable to both connection oriented protocols and connection less protocols; 2) suitable for both text and binary protocols; 3) no need to assemble IP packets into TCP or UDP flows; and 4) effective for both long-live flows and short-live flows. We implement Securitas and conduct extensive evaluations on real-world network traces containing both textual and binary protocols. Our experimental results on BitTorrent, CIFS/SMB, DNS, FTP, PPLIVE, SIP, and SMTP traces show that Securitas has the ability to accurately identify the network traces of the target application protocol with an average recall of about 97.4% and an average precision of about 98.4%. Our experimental results prove Securitas is a robust system, and meanwhile displaying a competitive performance in practice.

Journal ArticleDOI
TL;DR: This work designs a rateless-coded-incremental-relay selection algorithm based on greedy techniques to guarantee the required data rate with a minimum cost and develops both source- feedback and non-source-feedback-based fountain coded cooperative communication protocols to facilitate the data transmission between two neighbor CHs.
Abstract: Machine-to-machine communication over long-term evolution advanced (LTE-A) network has emerged as a new communication paradigm to support a variety of applications of Internet of Things. One of the most effective techniques to accommodate a large volume of machine type communication (MTC) devices in LTE-A is clustering where devices (nodes) are grouped into number of clusters and forward their traffics to the base station (e.g., LTE eNodeB) through some special nodes called cluster heads (CHs). In many applications, the CHs change location with time that causes variation in distances between neighboring CHs. When these distances increase, the performance of data transmission may degrade. To address this issue, we propose to employ intermediate non-CH nodes as relays between neighboring CHs. Our solution covers many aspects from relay selection to cooperative formation to meet the user’s QoS requirements. As the number of total relay plays a significant role in cooperative communications, we first design a rateless-coded-incremental-relay selection algorithm based on greedy techniques to guarantee the required data rate with a minimum cost. After that, we develop both source-feedback and non-source-feedback-based fountain coded cooperative communication protocols to facilitate the data transmission between two neighbor CHs. Numerical results are presented to demonstrate the performance of these protocols with different relay selection methods under Rayleigh fading channel. It shows that the proposed source-feedback-based protocol outperforms its non-source-feedbackprotocol counterpart in terms of a variety of metrics.

Journal ArticleDOI
TL;DR: To improve the assurance of CPS, it is vital to develop effective real-time attack monitoring and threat mitigation mechanisms.
Abstract: Modern industrial control systems and other complex cyber-physical systems such as smart grid, unmanned vehicles, manufacturing plants, chemical plants, and nuclear reactors are complex interconnected systems with extensive cyber and physical components, necessitating robust cyber-security techniques. These systems are complex interconnected combinations of heterogeneous hardware and software components and include sensors, actuators, physical systems and processes being controlled or monitored, computational nodes, communication protocols, and controllers. Besides computing/communications/networking based cyber-attacks, CPS are vulnerable to process-aware attacks that aim to disrupt the proper functioning or hamper performance, efficiency, stability, and safety of the physical systems/processes of the CPS. By modifying the information flow or the computational behavior of the system, process-aware attacks can disrupt the functioning the CPS to thereby hamper the performance or stability of the overall system or its components. Increasing network connectivity of the computational nodes of a CPS facilitates the maintenance and on-demand reprogrammability of computational nodes, greatly reducing the operator workload. However, this increasing connectivity raises the potential for cyber-attacks that attempt unauthorized modifications of the run-time parameters or control logic in the computational nodes. Hence, to improve the assurance of CPS, it is vital to develop effective real-time attack monitoring and threat mitigation mechanisms.

Journal ArticleDOI
TL;DR: This paper proposes an efficient improvement on Tu et al.
Abstract: The Session Initiation Protocol (SIP) is a signaling communications protocol, which has been chosen for controlling multimedia communication in 3G mobile networks. The proposed authentication in SIP is HTTP digest based authentication. Recently, Tu et al. presented an improvement of Zhang et al.’s smart card-based authenticated key agreement protocol for SIP. Their scheme efficiently resists password guessing attack. However, in this paper, we analyze the security of Tu et al.’s scheme and demonstrate their scheme is still vulnerable to user’s impersonation attack, server spoofing attack and man-in-the middle attack. We aim to propose an efficient improvement on Tu et al.’s scheme to overcome the weaknesses of their scheme, while retaining the original merits of their scheme. Through the rigorous informal and formal security analysis, we show that our scheme is secure against various known attacks including the attacks found in Tu et al.’s scheme. Furthermore, we simulate our scheme for the formal security analysis using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks including the replay and man-in-the-middle attacks. Additionally, the proposed scheme is comparable in terms of the communication and computational overheads with Tu et al.’s scheme and other related existing schemes.

Journal ArticleDOI
TL;DR: This paper presents a secure and scalable data communications protocol for smart grid data collection, and presents optimization solutions for minimizing the total data collection time.
Abstract: Deployment of data generation devices such as sensors and smart meters have been accelerating toward the vision of smart grid. The volume of data to be collected increases tremendously. Secure, efficient, and scalable data collection becomes a challenging task. In this paper, we present a secure and scalable data communications protocol for smart grid data collection. Under a hierarchical architecture, relay nodes [also known as data collectors (DCs)] collect and convey the data securely from measurement devices to the power operator. While the DCs can verify the integrity, they are not given access to the content, which may pave the way for third party providers to deliver value-added services or even the data collection itself. We further present optimization solutions for minimizing the total data collection time.

Journal ArticleDOI
TL;DR: A wireless sensor network designed for monitoring and risk management of landslides, where data collected by sensors are delivered through the network to a remote unit for online analysis and alerting with a very high level of robustness.
Abstract: In this paper, we propose a wireless sensor network (WSN) designed for monitoring and risk management of landslides, where data collected by sensors are delivered through the network to a remote unit for online analysis and alerting. To ensure fast deployment, robustness in harsh environments, and very long lifetime, the sensor nodes and the communication protocol have been specifically conceived, so that the network is self-organizing, fault tolerant, and adaptive. The WSN has been installed on a landslide located in Torgiovannetto (Italy) for an experimental campaign of several months where performance metrics, such as radio link and path statistics as well as battery levels, have been collected. These metrics demonstrated the effectiveness of the network protocols to manage self-organization, node failures, low link quality, and unexpected battery depletion. With negligible human intervention during the pilot experiment, the WSN revealed a very high level of robustness, which makes it suitable to monitor landslides in critical scenarios.

Proceedings ArticleDOI
05 Dec 2016
TL;DR: This paper fully reverse-engineer the proprietary communication protocol between a device programmer and the latest generation of a widely used Implantable Cardioverter Defibrillator (ICD) which communicate over a long-range RF channel (from two to five meters).
Abstract: Implantable Medical Devices (IMDs) typically use proprietary protocols with no or limited security to wirelessly communicate with a device programmer. These protocols enable doctors to carry out critical functions, such as changing the IMD's therapy or collecting telemetry data, without having to perform surgery on the patient. In this paper, we fully reverse-engineer the proprietary communication protocol between a device programmer and the latest generation of a widely used Implantable Cardioverter Defibrillator (ICD) which communicate over a long-range RF channel (from two to five meters). For this we follow a black-box reverse-engineering approach and use inexpensive Commercial Off-The-Shelf (COTS) equipment. We demonstrate that reverse-engineering is feasible by a weak adversary who has limited resources and capabilities without physical access to the devices. Our analysis of the proprietary protocol results in the identification of several protocol and implementation weaknesses. Unlike previous studies, which found no security measures, this article discovers the first known attempt to obfuscate the data that is transmitted over the air. Furthermore, we conduct privacy and Denial-of-Service (DoS) attacks and give evidence of other attacks that can compromise the patient's safety. All these attacks can be performed without needing to be in close proximity to the patient. We validate that our findings apply to (at least) 10 types of ICDs that are currently on the market. Finally, we propose several practical short- and long-term countermeasures to mitigate or prevent existing vulnerabilities.

Proceedings ArticleDOI
23 Mar 2016
TL;DR: A novel detection technique with constraint based specification is proposed in this paper which significantly improves the shortcomings of SVELTE and INTI and is valuated through comparative analysis using NS-2 simulation tool.
Abstract: Internet of Things (IoT), an emerging Internet based technical architecture where heterogeneous sensors collaborate for ubiquitous computing based on several technologies and standard communication protocols. With, such an amount of scaling and diverse technologies involved, IoT is susceptible to various threats. Hence, devising an IoT system, providing security through resistance against attacks is a de facto requirement to make IoT secure and operational. The existing works for detecting adversaries like SVELTE and INTI consume too much resource. Further, packet dropping ratio is high and number of nodes taken for evaluation is low with some critical metrics overlooked. A novel detection technique with constraint based specification is proposed in this paper which significantly improves the shortcomings of SVELTE and INTI. The effectiveness of proposed scheme is valuated through comparative analysis using NS-2 simulation tool.

Journal ArticleDOI
TL;DR: It is found that a quantum-dot repeater with the newest protocol ("MidpointSource") delivers the highest communication rate when there is low probability of establishing entanglement per transmission, and in some cases the rate is orders of magnitude higher than other schemes.
Abstract: We analyze how the performance of a quantum-repeater network depends on the protocol employed to distribute entanglement, and we find that the choice of repeater-to-repeater link protocol has a profound impact on communication rate as a function of hardware parameters. We develop numerical simulations of quantum networks using different protocols, where the repeater hardware is modeled in terms of key performance parameters, such as photon generation rate and collection efficiency. These parameters are motivated by recent experimental demonstrations in quantum dots, trapped ions, and nitrogen-vacancy centers in diamond. We find that a quantum-dot repeater with the newest protocol ("MidpointSource") delivers the highest communication rate when there is low probability of establishing entanglement per transmission, and in some cases the rate is orders of magnitude higher than other schemes. Our simulation tools can be used to evaluate communication protocols as part of designing a large-scale quantum network.

Journal ArticleDOI
24 Dec 2016-Sensors
TL;DR: It is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications, and it must be noted that, although this paper is aimed at fostering RFid communications security in IoT Applications, the methodology can be applied to any RFID communication protocol.
Abstract: The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol.

Proceedings ArticleDOI
23 May 2016
TL;DR: A vetted and militarily-realistic scenario is developed that provides a rich combination of elements for experimentation and is developed by the NATO Science & Technology Organization's IST-124 task group to develop and distribute an emulation environment and scenario.
Abstract: Emulation environments are an effective approach to experimenting with and evaluating network protocols, algorithms, and components. This paper describes a joint effort by the NATO Science & Technology Organization's IST-124 task group to develop and distribute an emulation environment and scenario. The most significant contribution is a vetted and militarily-realistic scenario that provides a rich combination of elements for experimentation. The scenario includes detailed mobility patterns for a battalion-sized operation over the course of two hours, which has been developed by military experts in planning and performing real exercises. The mobility patterns are used to drive the network emulation.

Proceedings ArticleDOI
03 Oct 2016
TL;DR: This paper verifies the effectiveness of OpenMili through benchmark communication/sensing experiments, and showcases its usage by prototyping a pairwise phased-array localization scheme, and a learning-assisted real-time beam adaptation protocol.
Abstract: The 60 GHz wireless technology holds great potential for multi-Gbps communications and high-precision radio sensing. But the lack of an accessible experimental platform has been impeding its progress. In this paper, we overcome the barrier with OpenMili, a reconfigurable 60 GHz radio architecture. OpenMili builds from off-the-shelf FPGA processor, data converters and 60 GHz RF front-end. It employs customized clocking, channelization and interfacing modules, to achieve Gsps sampling bandwidth, Gbps wireless bit-rate, and Gsps sample streaming from/to a PC host. It also incorporates the first programmable, electronically steerable 60 GHz phased-array antenna. OpenMili adopts programming models that ease development, through automatic parallelization inside signal processing blocks, and modular, rate-insensitive interfaces across blocks. It provides common reference designs to bootstrap the development of new network protocols and sensing applications. We verify the effectiveness of OpenMili through benchmark communication/sensing experiments, and showcase its usage by prototyping a pairwise phased-array localization scheme, and a learning-assisted real-time beam adaptation protocol.

Journal ArticleDOI
TL;DR: In this paper, the authors investigated energy-efficient clustering and medium access control for cellular-based machine-to-machine (M2M) networks to minimize device energy consumption and prolong network battery lifetime.
Abstract: In this paper, we investigate energy-efficient clustering and medium access control for cellular-based machine-to-machine (M2M) networks to minimize device energy consumption and prolong network battery lifetime. First, we present an accurate energy consumption model that considers both static and dynamic energy consumptions, and utilize this model to derive the network lifetime. Second, we find the cluster size to maximize the network lifetime and develop an energy-efficient cluster-head selection scheme. Furthermore, we find feasible regions where clustering is beneficial in enhancing network lifetime. We further investigate communications protocols for both intra- and inter-cluster communications. While inter-cluster communications use conventional cellular access schemes, we develop an energy-efficient and load-adaptive multiple access scheme, called $n$ -phase carrier sense multiple access with collision avoidance (CSMA/CA), which provides a tunable tradeoff between energy efficiency, delay, and spectral efficiency of the network. The simulation results show that the proposed clustering, cluster-head selection, and communications protocol design outperform the others in energy saving and significantly prolong the lifetimes of both individual nodes and the whole M2M network.

Posted Content
TL;DR: An energy-efficient and load-adaptive multiple access scheme, called n-phase carrier sense multiple access with collision avoidance (CSMA/CA), which provides a tunable tradeoff between energy efficiency, delay, and spectral efficiency of the network.
Abstract: In this paper, we investigate energy-efficient clustering and medium access control (MAC) for cellular-based M2M networks to minimize device energy consumption and prolong network battery lifetime. First, we present an accurate energy consumption model that considers both static and dynamic energy consumptions, and utilize this model to derive the network lifetime. Second, we find the cluster size to maximize the network lifetime and develop an energy-efficient cluster-head selection scheme. Furthermore, we find feasible regions where clustering is beneficial in enhancing network lifetime. We further investigate communications protocols for both intra- and inter-cluster communications. While inter-cluster communications use conventional cellular access schemes, we develop an energy-efficient and load-adaptive multiple access scheme, called n-phase CSMA/CA, which provides a tunable tradeoff between energy efficiency, delay, and spectral efficiency of the network. The simulation results show that the proposed clustering, cluster-head selection, and communications protocol design outperform the others in energy saving and significantly prolong the lifetimes of both individual nodes and the whole M2M network.

Journal ArticleDOI
01 Jan 2016
TL;DR: GITAR is proposed, a generic extension for Internet-of-Things architectures that enables dynamic application and network level upgrades in an efficient way and can reuse existing Contiki network protocols for dynamic updates without requiring modifications to the code.
Abstract: The Internet-of-Things (IoT) represents the third wave of computing innovation and relies on small, cheap and/or energy efficient devices, densely deployed in various spaces. Automatically managing, updating and upgrading the software on these devices, particularly the network stacks, with new, improved functionality is currently a major challenge. In this paper we propose GITAR, a generic extension for Internet-of-Things architectures, that enables dynamic application and network level upgrades in an efficient way. GITAR consists of four design concepts which can be applied to any operating system running on IoT/M2M devices. The proof of concept implementation in this paper uses the Contiki OS and the evaluation, based on analytical and experimental methods, shows that GITAR i) is up to 14% more efficient in terms of memory usage and ii) has less or similar run-time CPU overhead as state of the art solutions while offering upgrade functionality down to the network level and iii) can reuse existing Contiki network protocols for dynamic updates without requiring modifications to the code.

Proceedings ArticleDOI
01 Dec 2016
TL;DR: This research is to analyze the efficiency and applicability of different M2M protocols that are available for IoT communication and discusses and analyzed the efficiency, usage and requirements of the two major protocols namely MQTT, CoAP.
Abstract: The backbone of Internet of Things (IoT) is the communication protocols which seamlessly integrate thousands of nodes and enable a light weight data transfer process. This research is to analyze the efficiency and applicability of different M2M protocols that are available for IoT communication. For the purpose of evaluating the protocols a Raspberry-Pi with Raspbian OS and a temperature sensor are used. Every environment of IoT need a protocol with different capabilities, which makes it really specific of what protocol has to be used for a given number of nodes, communication range, power requirements and reliability. Upon research on today's IoT development, the major protocols that fit every IoT environment are MQTT and CoAP. These protocols are light weight in terms of operation and data transfer hence make into the markets of IoT. This research will highlight the outcomes, anomalies and benefits of each of these protocols. Previously the existence of advanced protocols did not exist and that made huge IoT networks very difficult to maintain as the communication costs were very high. This analysis will help it make better understand the need of a lightweight protocol. There are many protocols that can be used in IoT such as XMPP, DDS, AMQP, HTTP, REST etc. The deeper understanding of these protocols and application requirements is necessary to properly select which protocol is most suitable for the application at hand. This research paper is to discuss and analyze the efficiency, usage and requirements of the two major protocols namely MQTT, CoAP.

Journal ArticleDOI
TL;DR: A novel user-level fairness model UFair and its hierarchical variant UFairHA are introduced, which orchestrate HAS media streams using emerging network architectures and incorporate three fairness metrics (video quality, switching impact, and cost efficiency) to achieve user- level fairness in video distribution.
Abstract: The growing demand for online distribution of high quality and high throughput content is dominating today’s Internet infrastructure. This includes both production and user-generated media. Among the myriad of media distribution mechanisms, HTTP adaptive streaming (HAS) is becoming a popular choice for multi-screen and multi-bitrate media services over heterogeneous networks. HAS applications often compete for network resources without any coordination between each other. This leads to quality of experience (QoE) fluctuations on delivered content, and unfairness between end users, while new network protocols, technologies, and architectures, such as software defined networking (SDN), are being developed for the future Internet. The programmability, flexibility, and openness of these emerging developments can greatly assist the distribution of video over the Internet. This is driven by the increasing consumer demands and QoE requirements. This paper introduces a novel user-level fairness model UFair and its hierarchical variant UFair $^{\text {HA}}$ , which orchestrate HAS media streams using emerging network architectures and incorporate three fairness metrics (video quality, switching impact, and cost efficiency) to achieve user-level fairness in video distribution. UFair $^\text {HA}$ has also been implemented in a purpose-built SDN testbed using open technologies, including OpenFlow. Experimental results demonstrate the performance and feasibility of our design for video distribution over future networks.

Journal ArticleDOI
TL;DR: The practicability of the future full-IP IoT with realtime Web protocols is explained and the research challenges of service composition are discussed, to support the rapid creation of new ubiquitous applications.