-
381
An investigation of feature reduction, transferability, and generalization in AWID datasets for secure Wi-Fi networks.
Published 2025-01-01“…The widespread use of wireless networks to transfer an enormous amount of sensitive information has caused a plethora of vulnerabilities and privacy issues. …”
Get full text
Article -
382
A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks
Published 2016-01-01“…In comparison with traditional wired and wireless networks, WSNs possess additional vulnerabilities which present opportunities for attackers to launch novel and more complicated attacks against such networks. …”
Get full text
Article -
383
Consumption Reduction Solution of TV News Broadcast System Based on Wireless Communication Network
Published 2021-01-01“…This paper studies the card frame adaptive strategy, the system resource consumption reduction solution, and the deployment scheme of the mobile video and audio transmission terminal, which is of great significance to improve the design and research of the news broadcast system under the wireless network application and also has certain reference value for the design of other broadcasting and television solutions.…”
Get full text
Article -
384
Design of Remote Monitoring Iot System Based on 5G and New Optical Fiber Intelligent Structure
Published 2022-01-01“…The remote monitoring system is mainly a network system with convenient layout, simple maintenance, and high security performance built on the basis of the wireless network, which can realize real-time monitoring, and collects transmit information. …”
Get full text
Article -
385
Network information exposure based QoS prediction in tele-operated driving
Published 2023-03-01“…The rapid development of 5G systems supports the stringent quality of service (QoS) requirements for many Internet of vehicles (IoV) use cases.However, there are still many problems in the adaptation of networks and applications.Network information exposure is a potential solution that also enables the network to provide real-time cellular wireless network information to applications, thereby helping service providers achieve better policy control and achieve an experience for users.A predictive QoS (PQoS) method based on network information exposure was proposed.Applications could respond in advance and improve users’ quality of experience (QoE) by predicting upcoming network changes.Firstly, the background of network information exposure and PQoS was introduced, and the research, standards, and implementation status of PQoS both at home and abroad were introduced.Then, a QoS prediction method based on network information exposure in tele-operated driving (ToD) was proposed, and experiments were carried out through actual test data and the feasibility of PQoS was verified through the evaluation and analysis.The results show that the QoS prediction based on the network information exposure can well support the application of some IoV, including 5G remote driving, which provides a reference for implementing the 5G system in the smart transportation industry.…”
Get full text
Article -
386
Resilient routing in ad hoc wireless sensor networks
Published 2025-01-01“…This paper has devised an algorithm for identifying reliable routes for efficient and intelligent packet transmission in wireless network topology. A decision-based tree mechanism for routing has been developed, capable of establishing routes in an ad-hoc sensor network that can be transformed into a logical dual ring. …”
Get full text
Article -
387
Adaptive Media Streaming to Mobile Devices: Challenges, Enhancements, and Recommendations
Published 2014-01-01“…The final part of the paper studies efficient adaptation and delivery to mobile devices over wireless networks. We experimentally evaluate and improve adaptation strategies, multilink solutions, and bandwidth prediction techniques. …”
Get full text
Article -
388
Efficiency Simultaneous key Exchange-Cryptography Extraction from Public key in Fog-Cloud Federation-Based Secure Offloading for Automatic Weather Stations Observing Systems
Published 2023-03-01“…The data is sent to the CPS unsafely for processing, considering that the raw data in the wireless network is sent. No encryption operation or key exchange has been performed between the communication parties. …”
Get full text
Article -
389
Fast IEEE802.1Qbv Gate Scheduling Through Integer Linear Programming
Published 2024-01-01“…Time-Sensitive Networking (TSN) is an in-development technology that enables predictability over Ethernet or wireless networks. Network interfaces compliant with the IEEE 802.1Qbv standard provide different queues/gates on each bridge egress port. …”
Get full text
Article -
390
Cooperative secure transmission against collusive eavesdroppers in Internet of Things
Published 2020-06-01“…In this article, we study a cooperative-jamming-based physical layer secure transmission scheme for Internet of Things wireless networks in the presence of collusive eavesdroppers. …”
Get full text
Article -
391
Analysis and Synthesis of Double Negative Dielectric Media Rectenna Systems for Ambient Microwave Energy Harvesting
Published 2018-01-01“…The concept of harvesting the ambient electromagnetic radiation energy, coming from public telecommunication wireless networks, has been recently subject of extensive research. …”
Get full text
Article -
392
Computing native network (CNN) technology and application driven by joint communication & computing (JC&C)
Published 2023-08-01“…The global telecom industry is carrying out research and exploration of potential 6G technical architectures and key techs, of which it has become a consensus in the industry to further realize the vision of 6G smart inclusion by better enabling all new 6G network technologies and services through joint communication & computing (JC&C).Therefore, how to realize the deep integration and real-time collaboration of communication and computing to meet the needs of ultra-low latency and real-time response of new services in dynamic and complex network environments has become the challenge and key of JC&C.A computing native network (CNN) driven by JC&C was proposed, which realized the decoupling of communication and computing of base station or multiple base stations, computing pooling and intelligent JC&C scheduling through computing time division multiplexing and intelligent JC&C scheduling, thus realizing the base station to support communication and computation services simultaneously.The technology has been technically verified and piloted, and the experimental and pilot results demonstrate that CNN can effectively improve the computing utilization rate of wireless networks and realize the base station to support communication and computing services simultaneously, facilitating the evolution of 6G JC&C.…”
Get full text
Article -
393
Traffic scheduling system of the 5G core network user plane based on INT perception
Published 2023-10-01“…To solve the problem of huge pressure on network operation caused by the surge of 5G mobile data traffic and the continuous emergence of new network applications, a traffic scheduling system of the 5G core network user plane was designed and implemented, including network state information perception subsystem and routing decision subsystem.In the network state information perception subsystem, traditional in-band network telemetry methods incurred high bandwidth overhead and were not specifically designed for wireless network systems.Furthermore, the application of in-band network telemetry in the 5G core network faced challenges such as low measurement accuracy and the inability to guarantee QoS.A 5G core network user plane state information perception scheme based on in-band network telemetry was proposed.The telemetry information was inserted into the extended header of GTP-U message realize the measurement of network state along the path.The routing decision subsystem implemented the traffic scheduling algorithm based on the improved ant colony algorithm.The update method of the pheromone function was promoted by the perceived status information to complete the routing decision based on the real-time network state.The deployment test results showed that the network state information perception subsystem can perceive network information normally, and the routing decisions were superior to traditional routing algorithms in terms of delay, throughput and packet loss rate.…”
Get full text
Article -
394
End-Edge Collaborative Lightweight Secure Federated Learning for Anomaly Detection of Wireless Industrial Control Systems
Published 2024-01-01“…With the wide applications of industrial wireless network technologies, the industrial control system (ICS) is evolving from wired and centralized to wireless and distributed, during which eavesdropping and attacking become serious problems. …”
Get full text
Article -
395
3GPP-Compliant Datasets for xG Location-Aware Networks
Published 2024-01-01“…Location awareness is vital in next generation (xG) wireless networks to enable different use cases, including location-based services (LBSs) and efficient network management. …”
Get full text
Article -
396
Optimizing D2D Communication With Practical STAR-RIS and Irregular Configurations
Published 2024-01-01“…Device-to-device (D2D) communication offers significant potential for future wireless networks but faces challenges such as limited range, signal blockage, and interference. …”
Get full text
Article -
397
Newton Raphson based optimizer for optimal integration of FAS and RIS in wireless systems
Published 2025-03-01“…In modern wireless networks, the integration of Reconfigurable Intelligent Surface (RIS) and Fluid Antenna System (FAS) technologies offers a promising solution to the critical challenges such as signal attenuation, interference management, and security enhancement. …”
Get full text
Article -
398
Game Theoretical Approaches for Optimizing Multi-Carrier Half-Duplex Successive Relaying Based Cooperative NOMA
Published 2024-01-01“…Monte Carlo simulations demonstrate that the addition of these games to a wireless network provides a significant performance gain compared to traditional orthogonal multiple access methods, unoptimised C-NOMA, and the Distributed Matching Algorithm. …”
Get full text
Article -
399
Co-producing a live fieldwork broadcast in the biosciences
Published 2025-01-01“…A pocket wireless modem creates an outdoor wireless network with a mobile device and wireless microphones used to deliver the broadcast. …”
Get full text
Article -
400
Identifying Opportunities for Exploiting Cross-Layer Interactions in Adaptive Wireless Systems
Published 2007-01-01“…This opportunity is enhanced by the continued development of spectrally responsive devices—ones that can detect and respond to changes in the radio frequency environment. Present wireless network protocols define reliability and other performance-related tasks narrowly within layers. …”
Get full text
Article