Emerging Wireless Communication and Network Technologies - Principle, Paradigm and Performance

von: Karm Veer Arya, Robin Singh Bhadoria, Narendra S. Chaudhari

Springer-Verlag, 2018

ISBN: 9789811303968 , 359 Seiten

Format: PDF, Online Lesen

Kopierschutz: Wasserzeichen

Mac OSX,Windows PC für alle DRM-fähigen eReader Apple iPad, Android Tablet PC's Online-Lesen für: Mac OSX,Linux,Windows PC

Preis: 117,69 EUR

eBook anfordern eBook anfordern

Mehr zum Inhalt

Emerging Wireless Communication and Network Technologies - Principle, Paradigm and Performance


 

Preface

5

Contents

7

About the Editors

9

Wireless Technology and Communications—Explorations & Trends

10

Advancement in Wireless Technologies and Networks

11

1 Introduction

11

1.1 Need for Advancement in Wireless Technologies

12

2 Emerging Trends and Research Direction for Wireless Technologies

13

2.1 Advancement in Technology Along with Existing Works

16

3 Results and Discussion

16

4 Conclusion

17

References

18

Cognitive Radio Network Technologies and Applications

20

1 Introduction

20

2 Network Architecture of Cognitive Radio Networks

21

3 Spectrum Sensing

22

3.1 Noncooperative Sensing

23

3.2 Cooperative Sensing

27

3.3 Interference-Based Sensing

28

3.4 Predicting Channel to Sense

28

4 Spectrum Decision

29

5 Spectrum Sharing

31

5.1 Spectrum Allocation in Centralized Interweave Cognitive Radio Network

32

6 Spectrum Mobility

33

7 Security Issues in Cognitive Radio Networks

35

8 Applications of Cognitive Radio Networks in LTE and Wi-Fi

36

8.1 LTE and Wi-Fi Coexistence

37

8.2 Wi-Fi and DSRC Coexistence

40

9 Conclusion

40

References

41

Emerging Trends in Vehicular Communication Networks

44

1 Introduction: Vehicular Communication Networks

44

2 Requirements for Next-Generation Vehicular Communication Networks

46

3 Enabling Radio Technologies for Next-Generation Vehicular Networks

48

3.1 Dedicated Short-Range Communications (DSRC)

48

3.2 Long-Term Evolution (LTE) Cellular

48

3.3 Wi-Fi

49

3.4 Millimeter Wave Bands

49

3.5 Visible Light Bands

50

3.6 Satellite Communication

50

3.7 Low-Power Wide Area Networks (LPWANs)

50

4 Next-Generation Vehicular Architecture

51

4.1 Medium Access Control (MAC) Protocol Design

51

4.2 Network and Routing Protocol Design

52

4.3 Transport Protocol Design

54

5 Knowledge Acquisition and Distribution in Vehicular Communication Networks

55

5.1 Knowledge Acquisition

56

5.2 How to Measure the Utility of Data

58

5.3 Knowledge Distribution

59

6 Emerging Protocols for Privacy Management and Secure Data Access Control in Vehicular Networks

60

6.1 Security Concerns in Vehicular Networks

60

6.2 Emerging Protection Mechanisms for Vehicular Networks

61

7 Conclusions

62

References

63

An Overview of 5G Technologies

65

1 Introduction

65

2 Evolution of Mobile Technologies from 1G to 5G

66

3 5G Trends, Targets, Requirements, and Challenges

67

3.1 5G Trends

69

3.2 5G Targets

70

3.3 5G Requirements

71

3.4 5G Challenges

71

4 5G Enabling Technologies

72

4.1 Massive MIMO

73

4.2 mmWave Massive MIMO

74

4.3 Cloud Radio Access Networks

75

4.4 D2D Communications

75

4.5 Ultradense Heterogeneous Networks

77

5 Conclusions

82

References

83

Design and Application for Reliable Cooperative Networks

87

1 Relaying Protocol for Collaborative Transmission in Cooperative Networks

88

1.1 The Fundamental of Relay Protocols

88

1.2 Calculation of End-to-End Signal-to-Noise Ratio (SNR) for Relaying Networks and System Performance Evaluation

91

1.3 Considerations on DF Scheme in Relaying Networks

91

2 Simultaneous Wireless Information and Power Transfer-Aware Relay

92

2.1 Policies for Wireless Power Transfer

92

2.2 Energy Harvesting in Relaying Network

93

2.3 Investigation on Energy Harvesting System Performance

96

3 Full-Duplex Cooperative Networks

96

3.1 An Architecture of Full-Duplex Energy Harvesting Network

97

3.2 Full-Duplex System Analysis

98

3.3 System Performance Analysis

100

4 Secure Communication Between Source and Destination via Untrusted Node

100

4.1 Secure Relaying Communication Model

101

4.2 Maximum Energy Harvesting (MEH) Protocol

101

5 MIMO Relaying Model and Challenges in Relaying Design

103

5.1 Wireless Powered Communication with Multi-antenna System

103

5.2 Challenges in Design of Cooperative Networks

105

6 Conclusion

105

References

106

Semantics for Delay-Tolerant Network (DTN)

107

1 Introduction

107

1.1 Significance of DTN

108

1.2 Features of DTN

109

1.3 Applications of DTN

109

2 DTN Architecture

111

2.1 System Architecture

111

2.2 Layer Architecture

113

3 Transmission in Delay-Tolerant Network

114

3.1 Contacts

114

3.2 Bundle Protocol

115

3.3 Custody Transfer

117

3.4 Flow and Congestion Control

117

3.5 Message Switching

118

4 Routing in Delay-Tolerant Network

119

4.1 Unicast Routing

119

4.2 Multicast Routing

119

4.3 Anycast Routing

122

4.4 Buffer Management

123

4.5 Performance Metrics

123

5 Security in Delay-Tolerant Network

124

5.1 Security Issues

125

5.2 Fragments Authentication

125

6 Delay-Tolerant Network and Vehicular Adhoc Netwwork

125

6.1 Overview of VANET Delay-Tolerant Networks

125

6.2 Characteristics of VDTN

126

6.3 DTN Protocols for VANET Delay-Tolerant Networks

127

7 Conclusions and Future Scope

128

References

128

Wireless Technology and Communications—Methodologies & Implementations

130

Architectural Building Protocols for Li-Fi (Light Fidelity)

131

1 Introduction

131

1.1 Visible Light Communication

132

1.2 Importance of VLC

132

1.3 Modes of Communication in VLC

133

2 Light Fidelity

133

2.1 Need of Li-Fi

133

2.2 Challenges for Li-Fi

134

2.3 Comparison of Li-Fi and Wi-Fi

135

2.4 Architecture of Li-Fi

136

2.5 Difference Between Photodiode and Image Sensor

137

2.6 Working of Li-Fi

137

3 Li-Fi Standardization and Its Integrated Communication Protocols Solution

138

3.1 OOK Modulation with Dimming

139

3.2 VPPM Modulation with Dimming

139

3.3 CSK Modulation with Dimming

140

3.4 Hybrid Li-Fi: Integrating Li-Fi with Wi-Fi

140

4 Conclusion and Future Scope

140

References

141

Infrastructure in Mobile Opportunistic Networks

142

1 Concept, Protocol and Architecture for Mobile Opportunistic Networks

142

1.1 Routing Protocols

143

2 Cooperative Framework for Building Opportunistic Networks

145

3 Recent Advances in Routing Methodologies

148

3.1 Challenges in Opportunistic Routing

149

4 Mobile Peer-to-Peer Content Dissemination Model in Load Balancing

151

5 Privacy and Forwarding Models in Mobile Opportunistic Networks

153

6 Concept for Pocket Switched Networks, Amorphous and Semantic Opportunistic Networks

154

6.1 Amorphous Opportunistic Networks

154

7 Future Research Trends in Mobile Opportunistic Networks

155

8 Conclusion

156

References

156

Generic Design and Advances in Wearable Sensor Technology

158

1 Introduction of Wearable Sensor-Based Systems—Design and Architecture

159

2 Challenges and Issue in Wearable Computing and Sensor Implications

160

3 Wireless Communication Standards Used in Wearable Technology

161

3.1 Short-Range Wireless Communication Standards for Wearable Sensors

161

3.2 Long-Range Wireless Communication Standards for Wearable Sensors

163

4 Design Antenna for Wearable Devices System

164

5 Inferences of Body Area Network System Architectures

164

5.1 Sensors Tire

164

5.2 Mobile Tire

165

5.3 Remote Server Tire

165

6 Wearable Sensor Based on Advanced Materials

166

6.1 Wearable Temperature Sensors

166

6.2 Wearable Strain Sensors

167

6.3 Wearable Devices for Sensing Change Through the Skin

167

6.4 Nanomaterials-Based Wearable Sensors

168

7 Power Harvesting for Wearable Devices System

168

7.1 Self-power Devices

168

7.2 Energy Harvesting from Heat of the Human Body

169

7.3 Rechargeable Micro-battery and Super-Capacitors for Energy Harvesting

169

7.4 Energy Harvesting from Electromagnetic Radio Frequency Spectrum

169

8 Use Case for Optics for Smart Glasses, Augmented Reality, and Virtual Reality Headsets

170

8.1 Augmented Reality Smart Glasses

170

8.2 Using Smart Glass in Surgical Education

170

8.3 Wearable Contact Lenses

171

9 Use Case in Health Monitoring and Prognosis

171

10 Conclusion

172

References

172

Realizing the Wireless Technology in Internet of Things (IoT)

175

1 Introduction of IoT with Emerging Wireless Technologies

176

1.1 Types of Communication Within the IoT and Challenges

176

1.2 Potential Applications

177

1.3 Privacy Hazards

178

2 Basic Elements for Forming IoT and Addressing the Issues Associated with It

178

2.1 Components of IoT

178

2.2 Application Protocols

179

2.3 Frequency Bands and Regulations

180

3 General Architecture and Factors Affecting IoT Centric Features

181

3.1 General Architecture and Reference Ones

181

3.2 IoT Key Performance Indicators

183

3.3 Security Threats and Countermeasures

184

4 Middleware Technology for Grooming IoT Essence

186

4.1 Middleware for Internet of Things: Challenges

186

4.2 Classification of IoT Middleware

186

4.3 Popular IoT Middleware

187

5 The Device-to-Device (D2D) Communications Protocol Stack

188

5.1 Device-to-Device (D2D) Communication Technologies

188

5.2 Characteristics of D2D Communication Within IoT

190

5.3 Existing Routing Algorithms and Protocols

191

6 Conclusions

192

References

192

Fast and Flexible Initial Uplink Synchronization for Long-Term Evolution

195

1 Background

195

1.1 Initial Uplink Synchronization (IUS)

195

1.2 Related Works

196

1.3 Emerging Challenges and Our Contributions

197

2 IUS Signal Representation

198

3 A Sparse Recovery Method

200

3.1 ell1 Optimization Strategy

201

3.2 Smoothed ell0 Norm Minimization isl0

202

4 Codebook Design

204

4.1 The Mutual Coherence

205

5 Zadoff–Chu Sequence Selection

205

5.1 Small CFO

205

5.2 Mitigating the Adverse Effects of CFO

207

6 Simulation Results

207

6.1 Performance Evaluation at Low CFO

208

6.2 Performance Evaluation at Larger CFO

210

7 Need of Advancement of IUS Algorithms for Future Wireless Communication

211

8 Conclusion

211

References

212

Wireless Technology and Communications—Advancement & Future Scope

214

Toward a “Green” Generation of Wireless Communications Systems

215

1 Introduction

215

2 RF Front-End Imperfection Models

217

2.1 Power Amplifier Nonlinear Distortion

217

2.2 Phase Noise

218

2.3 Analog-to-Digital Converter Quantization Noise

218

2.4 IQ Imbalances

219

2.5 Quantification of the RF Front-End Quality

220

3 Spectral Efficiency Using Full-Duplex

221

3.1 Self-interference Reduction Techniques: Antenna, RF, and Digital Cancelation with “Real-Life” Components

222

3.2 RF Imperfections on Full-Duplex Relays

225

3.3 Self-interference Channel Models

230

4 Massive MIMO Systems

232

4.1 Low Complexity RF Front-End Design

233

4.2 Power Efficiency and Linear Precoding Techniques

234

4.3 Numerical Evaluation

236

5 Summary of the Chapter

237

References

238

Security Attacks on Wireless Networks and Their Detection Techniques

241

1 Introduction

241

1.1 Introduction to Wireless Networking

242

1.2 Wireless Access Points

242

1.3 Advantages of Using Wireless Network

242

1.4 Communiqué Using Wireless Networks

244

1.5 Data Frames in Wireless Networking

245

2 Vulnerabilities in Wireless Network

246

2.1 Vulnerability Definition

246

2.2 Insecure Physical Location

247

2.3 Rogue Access Points

247

2.4 Physical Access Is Not Required

248

2.5 Inadequate Encryption and Decryption Standards

248

2.6 Unidentified Network Boundary

248

2.7 Insecure Wireless Network

249

3 Attacks in Wireless Network

249

3.1 Attack Definition

250

3.2 Attacks Classification in Wireless Networks

250

3.3 Denial-of-Service Attacks

252

3.4 Man-in-the-Middle Attacks

255

3.5 Wireless Cipher Attacks

257

3.6 Cryptocurrency Attacks

260

3.7 Accounts-Linked Attacks (Semantic Attacks)

261

3.8 Security Breaches

263

4 Wireless Defense Mechanism

263

4.1 Wireless Security Goals

264

4.2 Attack Detection Techniques

265

5 Conclusion

268

References

268

Spectrum Decision Mechanisms in Cognitive Radio Networks

271

1 Introduction

271

2 Spectrum Decision Overview

272

2.1 Spectrum Characterization

273

2.2 Spectrum Selection

274

2.3 CR Device Reconfiguration

275

2.4 Reinforcement Steps for Spectrum Decision

275

3 An Overview of Spectrum Decision Frameworks

276

3.1 Definition of Spectrum Decision Frameworks

276

3.2 Framework 1: A Spectrum Decision Framework for Cognitive Radio Networks

276

3.3 Framework 2: A QoS-Aware Framework for Available Spectrum Characterization and Decision in Cognitive Radio Networks

279

3.4 Framework 3: A Belief-Based Decision-Making Framework for Spectrum Selection in Cognitive Radio Networks

280

3.5 Framework 4: Reducing Spectrum Handoffs and Energy Switching Consumption of MADM-Based Decision in Cognitive Radio Networks

281

4 Discussion

291

4.1 Open Issues

291

4.2 Discussion of New Technologies in CRN

292

5 Conclusions

293

References

293

Vehicular Networks to Intelligent Transportation Systems

297

1 Introduction

297

2 Intelligent Transportation Systems

299

2.1 Architecture

299

2.2 Vehicular Ad Hoc Networks

300

2.3 Integration with Other Networks

302

3 Infrastructure and Services

303

3.1 ITS Infrastructure

303

3.2 Traffic Prediction

305

3.3 Mobility and Traffic

305

4 Data and Security in ITS

308

4.1 Data Collection and Quality

308

4.2 Security

310

5 Conclusion

313

References

313

State Estimation and Anomaly Detection in Wireless Sensor Networks

316

1 Introduction

316

2 Statistical Models for State Estimation

319

2.1 Linear Mixed Model

321

2.2 Modelling the General Effect of Time

322

2.3 Modelling the Random Effects of Time

322

2.4 Joint Likelihood Function and Parameter Estimation

323

2.5 Detection of Anomalous Node

323

3 Numerical Studies

325

3.1 Simulation 1

325

3.2 Simulation 2

327

4 Conclusions and Future Work

330

References

331

Experimental Wireless Network Deployment of Software-Defined and Virtualized Networking in 5G Environments

334

1 Introduction

334

2 Mobility Management in 5G Networks

336

2.1 Software-Defined Networking and Network Function Virtualization as Key Enablers

337

2.2 The Role of Network Slicing

338

3 Points of Attachment Virtualization

339

3.1 Overview of Existing Works

340

3.2 Virtualization Approaches and Their Signalling

340

3.3 Virtual Wi-Fi Access Point Evaluation

343

4 Bringing User Context to the Cloud

344

4.1 Virtualizing the User Equipment

345

4.2 Mobile Node Virtualization Procedures

346

4.3 Proof-of-Concept Prototype Evaluation

350

5 The Impact of Virtualization in 5G Scenarios

352

5.1 Mobile Operator

353

5.2 Mobile-Edge Computing

353

5.3 Smart-Cities

354

6 Use Case Scenario in Wireless Testbed

355

6.1 Deployment and Signalling

355

6.2 Scenario Evaluation

356

7 Conclusions and Future Work

356

References

357