Suche
Lesesoftware
Specials
Info / Kontakt
Emerging Wireless Communication and Network Technologies - Principle, Paradigm and Performance
von: Karm Veer Arya, Robin Singh Bhadoria, Narendra S. Chaudhari
Springer-Verlag, 2018
ISBN: 9789811303968 , 359 Seiten
Format: PDF, Online Lesen
Kopierschutz: Wasserzeichen
Preis: 117,69 EUR
eBook anfordern
Mehr zum Inhalt
Emerging Wireless Communication and Network Technologies - Principle, Paradigm and Performance
Preface
5
Contents
7
About the Editors
9
Wireless Technology and Communications—Explorations & Trends
10
Advancement in Wireless Technologies and Networks
11
1 Introduction
11
1.1 Need for Advancement in Wireless Technologies
12
2 Emerging Trends and Research Direction for Wireless Technologies
13
2.1 Advancement in Technology Along with Existing Works
16
3 Results and Discussion
16
4 Conclusion
17
References
18
Cognitive Radio Network Technologies and Applications
20
1 Introduction
20
2 Network Architecture of Cognitive Radio Networks
21
3 Spectrum Sensing
22
3.1 Noncooperative Sensing
23
3.2 Cooperative Sensing
27
3.3 Interference-Based Sensing
28
3.4 Predicting Channel to Sense
28
4 Spectrum Decision
29
5 Spectrum Sharing
31
5.1 Spectrum Allocation in Centralized Interweave Cognitive Radio Network
32
6 Spectrum Mobility
33
7 Security Issues in Cognitive Radio Networks
35
8 Applications of Cognitive Radio Networks in LTE and Wi-Fi
36
8.1 LTE and Wi-Fi Coexistence
37
8.2 Wi-Fi and DSRC Coexistence
40
9 Conclusion
40
References
41
Emerging Trends in Vehicular Communication Networks
44
1 Introduction: Vehicular Communication Networks
44
2 Requirements for Next-Generation Vehicular Communication Networks
46
3 Enabling Radio Technologies for Next-Generation Vehicular Networks
48
3.1 Dedicated Short-Range Communications (DSRC)
48
3.2 Long-Term Evolution (LTE) Cellular
48
3.3 Wi-Fi
49
3.4 Millimeter Wave Bands
49
3.5 Visible Light Bands
50
3.6 Satellite Communication
50
3.7 Low-Power Wide Area Networks (LPWANs)
50
4 Next-Generation Vehicular Architecture
51
4.1 Medium Access Control (MAC) Protocol Design
51
4.2 Network and Routing Protocol Design
52
4.3 Transport Protocol Design
54
5 Knowledge Acquisition and Distribution in Vehicular Communication Networks
55
5.1 Knowledge Acquisition
56
5.2 How to Measure the Utility of Data
58
5.3 Knowledge Distribution
59
6 Emerging Protocols for Privacy Management and Secure Data Access Control in Vehicular Networks
60
6.1 Security Concerns in Vehicular Networks
60
6.2 Emerging Protection Mechanisms for Vehicular Networks
61
7 Conclusions
62
References
63
An Overview of 5G Technologies
65
1 Introduction
65
2 Evolution of Mobile Technologies from 1G to 5G
66
3 5G Trends, Targets, Requirements, and Challenges
67
3.1 5G Trends
69
3.2 5G Targets
70
3.3 5G Requirements
71
3.4 5G Challenges
71
4 5G Enabling Technologies
72
4.1 Massive MIMO
73
4.2 mmWave Massive MIMO
74
4.3 Cloud Radio Access Networks
75
4.4 D2D Communications
75
4.5 Ultradense Heterogeneous Networks
77
5 Conclusions
82
References
83
Design and Application for Reliable Cooperative Networks
87
1 Relaying Protocol for Collaborative Transmission in Cooperative Networks
88
1.1 The Fundamental of Relay Protocols
88
1.2 Calculation of End-to-End Signal-to-Noise Ratio (SNR) for Relaying Networks and System Performance Evaluation
91
1.3 Considerations on DF Scheme in Relaying Networks
91
2 Simultaneous Wireless Information and Power Transfer-Aware Relay
92
2.1 Policies for Wireless Power Transfer
92
2.2 Energy Harvesting in Relaying Network
93
2.3 Investigation on Energy Harvesting System Performance
96
3 Full-Duplex Cooperative Networks
96
3.1 An Architecture of Full-Duplex Energy Harvesting Network
97
3.2 Full-Duplex System Analysis
98
3.3 System Performance Analysis
100
4 Secure Communication Between Source and Destination via Untrusted Node
100
4.1 Secure Relaying Communication Model
101
4.2 Maximum Energy Harvesting (MEH) Protocol
101
5 MIMO Relaying Model and Challenges in Relaying Design
103
5.1 Wireless Powered Communication with Multi-antenna System
103
5.2 Challenges in Design of Cooperative Networks
105
6 Conclusion
105
References
106
Semantics for Delay-Tolerant Network (DTN)
107
1 Introduction
107
1.1 Significance of DTN
108
1.2 Features of DTN
109
1.3 Applications of DTN
109
2 DTN Architecture
111
2.1 System Architecture
111
2.2 Layer Architecture
113
3 Transmission in Delay-Tolerant Network
114
3.1 Contacts
114
3.2 Bundle Protocol
115
3.3 Custody Transfer
117
3.4 Flow and Congestion Control
117
3.5 Message Switching
118
4 Routing in Delay-Tolerant Network
119
4.1 Unicast Routing
119
4.2 Multicast Routing
119
4.3 Anycast Routing
122
4.4 Buffer Management
123
4.5 Performance Metrics
123
5 Security in Delay-Tolerant Network
124
5.1 Security Issues
125
5.2 Fragments Authentication
125
6 Delay-Tolerant Network and Vehicular Adhoc Netwwork
125
6.1 Overview of VANET Delay-Tolerant Networks
125
6.2 Characteristics of VDTN
126
6.3 DTN Protocols for VANET Delay-Tolerant Networks
127
7 Conclusions and Future Scope
128
References
128
Wireless Technology and Communications—Methodologies & Implementations
130
Architectural Building Protocols for Li-Fi (Light Fidelity)
131
1 Introduction
131
1.1 Visible Light Communication
132
1.2 Importance of VLC
132
1.3 Modes of Communication in VLC
133
2 Light Fidelity
133
2.1 Need of Li-Fi
133
2.2 Challenges for Li-Fi
134
2.3 Comparison of Li-Fi and Wi-Fi
135
2.4 Architecture of Li-Fi
136
2.5 Difference Between Photodiode and Image Sensor
137
2.6 Working of Li-Fi
137
3 Li-Fi Standardization and Its Integrated Communication Protocols Solution
138
3.1 OOK Modulation with Dimming
139
3.2 VPPM Modulation with Dimming
139
3.3 CSK Modulation with Dimming
140
3.4 Hybrid Li-Fi: Integrating Li-Fi with Wi-Fi
140
4 Conclusion and Future Scope
140
References
141
Infrastructure in Mobile Opportunistic Networks
142
1 Concept, Protocol and Architecture for Mobile Opportunistic Networks
142
1.1 Routing Protocols
143
2 Cooperative Framework for Building Opportunistic Networks
145
3 Recent Advances in Routing Methodologies
148
3.1 Challenges in Opportunistic Routing
149
4 Mobile Peer-to-Peer Content Dissemination Model in Load Balancing
151
5 Privacy and Forwarding Models in Mobile Opportunistic Networks
153
6 Concept for Pocket Switched Networks, Amorphous and Semantic Opportunistic Networks
154
6.1 Amorphous Opportunistic Networks
154
7 Future Research Trends in Mobile Opportunistic Networks
155
8 Conclusion
156
References
156
Generic Design and Advances in Wearable Sensor Technology
158
1 Introduction of Wearable Sensor-Based Systems—Design and Architecture
159
2 Challenges and Issue in Wearable Computing and Sensor Implications
160
3 Wireless Communication Standards Used in Wearable Technology
161
3.1 Short-Range Wireless Communication Standards for Wearable Sensors
161
3.2 Long-Range Wireless Communication Standards for Wearable Sensors
163
4 Design Antenna for Wearable Devices System
164
5 Inferences of Body Area Network System Architectures
164
5.1 Sensors Tire
164
5.2 Mobile Tire
165
5.3 Remote Server Tire
165
6 Wearable Sensor Based on Advanced Materials
166
6.1 Wearable Temperature Sensors
166
6.2 Wearable Strain Sensors
167
6.3 Wearable Devices for Sensing Change Through the Skin
167
6.4 Nanomaterials-Based Wearable Sensors
168
7 Power Harvesting for Wearable Devices System
168
7.1 Self-power Devices
168
7.2 Energy Harvesting from Heat of the Human Body
169
7.3 Rechargeable Micro-battery and Super-Capacitors for Energy Harvesting
169
7.4 Energy Harvesting from Electromagnetic Radio Frequency Spectrum
169
8 Use Case for Optics for Smart Glasses, Augmented Reality, and Virtual Reality Headsets
170
8.1 Augmented Reality Smart Glasses
170
8.2 Using Smart Glass in Surgical Education
170
8.3 Wearable Contact Lenses
171
9 Use Case in Health Monitoring and Prognosis
171
10 Conclusion
172
References
172
Realizing the Wireless Technology in Internet of Things (IoT)
175
1 Introduction of IoT with Emerging Wireless Technologies
176
1.1 Types of Communication Within the IoT and Challenges
176
1.2 Potential Applications
177
1.3 Privacy Hazards
178
2 Basic Elements for Forming IoT and Addressing the Issues Associated with It
178
2.1 Components of IoT
178
2.2 Application Protocols
179
2.3 Frequency Bands and Regulations
180
3 General Architecture and Factors Affecting IoT Centric Features
181
3.1 General Architecture and Reference Ones
181
3.2 IoT Key Performance Indicators
183
3.3 Security Threats and Countermeasures
184
4 Middleware Technology for Grooming IoT Essence
186
4.1 Middleware for Internet of Things: Challenges
186
4.2 Classification of IoT Middleware
186
4.3 Popular IoT Middleware
187
5 The Device-to-Device (D2D) Communications Protocol Stack
188
5.1 Device-to-Device (D2D) Communication Technologies
188
5.2 Characteristics of D2D Communication Within IoT
190
5.3 Existing Routing Algorithms and Protocols
191
6 Conclusions
192
References
192
Fast and Flexible Initial Uplink Synchronization for Long-Term Evolution
195
1 Background
195
1.1 Initial Uplink Synchronization (IUS)
195
1.2 Related Works
196
1.3 Emerging Challenges and Our Contributions
197
2 IUS Signal Representation
198
3 A Sparse Recovery Method
200
3.1 ell1 Optimization Strategy
201
3.2 Smoothed ell0 Norm Minimization isl0
202
4 Codebook Design
204
4.1 The Mutual Coherence
205
5 Zadoff–Chu Sequence Selection
205
5.1 Small CFO
205
5.2 Mitigating the Adverse Effects of CFO
207
6 Simulation Results
207
6.1 Performance Evaluation at Low CFO
208
6.2 Performance Evaluation at Larger CFO
210
7 Need of Advancement of IUS Algorithms for Future Wireless Communication
211
8 Conclusion
211
References
212
Wireless Technology and Communications—Advancement & Future Scope
214
Toward a “Green” Generation of Wireless Communications Systems
215
1 Introduction
215
2 RF Front-End Imperfection Models
217
2.1 Power Amplifier Nonlinear Distortion
217
2.2 Phase Noise
218
2.3 Analog-to-Digital Converter Quantization Noise
218
2.4 IQ Imbalances
219
2.5 Quantification of the RF Front-End Quality
220
3 Spectral Efficiency Using Full-Duplex
221
3.1 Self-interference Reduction Techniques: Antenna, RF, and Digital Cancelation with “Real-Life” Components
222
3.2 RF Imperfections on Full-Duplex Relays
225
3.3 Self-interference Channel Models
230
4 Massive MIMO Systems
232
4.1 Low Complexity RF Front-End Design
233
4.2 Power Efficiency and Linear Precoding Techniques
234
4.3 Numerical Evaluation
236
5 Summary of the Chapter
237
References
238
Security Attacks on Wireless Networks and Their Detection Techniques
241
1 Introduction
241
1.1 Introduction to Wireless Networking
242
1.2 Wireless Access Points
242
1.3 Advantages of Using Wireless Network
242
1.4 Communiqué Using Wireless Networks
244
1.5 Data Frames in Wireless Networking
245
2 Vulnerabilities in Wireless Network
246
2.1 Vulnerability Definition
246
2.2 Insecure Physical Location
247
2.3 Rogue Access Points
247
2.4 Physical Access Is Not Required
248
2.5 Inadequate Encryption and Decryption Standards
248
2.6 Unidentified Network Boundary
248
2.7 Insecure Wireless Network
249
3 Attacks in Wireless Network
249
3.1 Attack Definition
250
3.2 Attacks Classification in Wireless Networks
250
3.3 Denial-of-Service Attacks
252
3.4 Man-in-the-Middle Attacks
255
3.5 Wireless Cipher Attacks
257
3.6 Cryptocurrency Attacks
260
3.7 Accounts-Linked Attacks (Semantic Attacks)
261
3.8 Security Breaches
263
4 Wireless Defense Mechanism
263
4.1 Wireless Security Goals
264
4.2 Attack Detection Techniques
265
5 Conclusion
268
References
268
Spectrum Decision Mechanisms in Cognitive Radio Networks
271
1 Introduction
271
2 Spectrum Decision Overview
272
2.1 Spectrum Characterization
273
2.2 Spectrum Selection
274
2.3 CR Device Reconfiguration
275
2.4 Reinforcement Steps for Spectrum Decision
275
3 An Overview of Spectrum Decision Frameworks
276
3.1 Definition of Spectrum Decision Frameworks
276
3.2 Framework 1: A Spectrum Decision Framework for Cognitive Radio Networks
276
3.3 Framework 2: A QoS-Aware Framework for Available Spectrum Characterization and Decision in Cognitive Radio Networks
279
3.4 Framework 3: A Belief-Based Decision-Making Framework for Spectrum Selection in Cognitive Radio Networks
280
3.5 Framework 4: Reducing Spectrum Handoffs and Energy Switching Consumption of MADM-Based Decision in Cognitive Radio Networks
281
4 Discussion
291
4.1 Open Issues
291
4.2 Discussion of New Technologies in CRN
292
5 Conclusions
293
References
293
Vehicular Networks to Intelligent Transportation Systems
297
1 Introduction
297
2 Intelligent Transportation Systems
299
2.1 Architecture
299
2.2 Vehicular Ad Hoc Networks
300
2.3 Integration with Other Networks
302
3 Infrastructure and Services
303
3.1 ITS Infrastructure
303
3.2 Traffic Prediction
305
3.3 Mobility and Traffic
305
4 Data and Security in ITS
308
4.1 Data Collection and Quality
308
4.2 Security
310
5 Conclusion
313
References
313
State Estimation and Anomaly Detection in Wireless Sensor Networks
316
1 Introduction
316
2 Statistical Models for State Estimation
319
2.1 Linear Mixed Model
321
2.2 Modelling the General Effect of Time
322
2.3 Modelling the Random Effects of Time
322
2.4 Joint Likelihood Function and Parameter Estimation
323
2.5 Detection of Anomalous Node
323
3 Numerical Studies
325
3.1 Simulation 1
325
3.2 Simulation 2
327
4 Conclusions and Future Work
330
References
331
Experimental Wireless Network Deployment of Software-Defined and Virtualized Networking in 5G Environments
334
1 Introduction
334
2 Mobility Management in 5G Networks
336
2.1 Software-Defined Networking and Network Function Virtualization as Key Enablers
337
2.2 The Role of Network Slicing
338
3 Points of Attachment Virtualization
339
3.1 Overview of Existing Works
340
3.2 Virtualization Approaches and Their Signalling
340
3.3 Virtual Wi-Fi Access Point Evaluation
343
4 Bringing User Context to the Cloud
344
4.1 Virtualizing the User Equipment
345
4.2 Mobile Node Virtualization Procedures
346
4.3 Proof-of-Concept Prototype Evaluation
350
5 The Impact of Virtualization in 5G Scenarios
352
5.1 Mobile Operator
353
5.2 Mobile-Edge Computing
353
5.3 Smart-Cities
354
6 Use Case Scenario in Wireless Testbed
355
6.1 Deployment and Signalling
355
6.2 Scenario Evaluation
356
7 Conclusions and Future Work
356
References
357