首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Remote patient monitoring is an eHealth service, which is used to collect and transfer biosignal data from the patients to the eHealth service provider (e.g., healthcare center). A heterogeneous wireless access-based remote patient monitoring system is presented in which multiple wireless technologies are integrated to support continuous biosignal monitoring in presence of patient mobility. A patient-attached monitoring device with a heterogeneous wireless transceiver collects biosignal data from the sensors and transmits the data through the radio access network (RAN) to the eHeath service provider. In this system, the eHealth service provider reserves wireless bandwidth (or connections) from a network service provider in a proactive manner as well as in an on-demand basis. To determine the optimal number of connections to be reserved pro-actively so that the network access cost is minimized, a stochastic programming problem is formulated considering the randomness of service demand due to the mobility of the patients. Since different biosignal data can have different quality-of-service (QoS) requirements, traffic scheduling is used in the patient-attached device which determines whether to transmit and what to transmit over an available wireless connection. To make the optimal scheduling decision, an optimization problem is formulated as a constrained Markov decision process (CMDP). The objective of this formulation is to minimize the connection cost. The proposed system architecture and the optimization formulations will be useful for the eHealth service provider to provide flexible and cost-effective monitoring service to remote/mobile patients.  相似文献   

2.
可证明安全的异构无线网络认证协议   总被引:1,自引:0,他引:1  
异构无线网络中互连的安全问题是当前研究的关注点,针对3G网络和WLAN(无线局域网)所构成的异构互连网络中认证协议的安全和效率问题,提出了一种基于离线计费方法的认证协议。该协议通过对WLAN服务网络身份进行验证,抵御了重定向攻击的行为;采用局部化重认证过程,减少了认证消息的传输延时,提高了认证协议的效率。仿真结果表明,该协议的平均消息传输延时相对于EAP—AKA协议缩短了大约一半。通过Canetti—Krawczyk(CK)安全模型对新协议进行了安全性证明,证明该协议具有SK—secure安全属性。  相似文献   

3.
Data aggregation is considered as one of the fundamental distributed data processing procedures for saving the energy and minimizing the medium access layer contention in wireless sensor networks. However, sensor networks are likely to be deployed in an untrusted environment, which make them vulnerable against several attacks. A compromised node may forge arbitrary aggregation value and mislead the base station into trusting a false reading. Secure in-network aggregation can detect such manipulation. But, as long as such subversive activity is, reliable aggregation result can not be obtained. In contrast, the collection of individual sensor node values is robust and solves the problem of availability, but in an inefficient way. Our work seeks to bridge this gap in secure data collection. We propose a framework that enhances availability with efficiency close to that of in-network aggregation avoiding over-reliance on sensors. To achieve this, we design a scheme that is built on one core concept: no trust is supposed in any sensor. Therefore, we design a two hierarchical levels of monitoring to ensure the integrity and the accuracy of aggregate result, only when necessary, i.e. only when malicious activities are detected. Relying on this new type of monitoring mechanism, the framework has the ability to recover from aggregator failure without neglecting energy efficiency, providing thus much higher availability than other security protocols.  相似文献   

4.
A signaling architecture for wireless ATM access networks   总被引:1,自引:0,他引:1  
A multiservice wireless Asynchronous Transfer Mode (ATM) access system is considered from a signaling protocol viewpoint. In an attempt to generalize and extend results and experiences obtained from the specification, design, and implementation of fixed ATM‐based access networks, we extend the concept of the broadband V interface (referred to as VB) for application to wireless ATM access networks. The proposed architecture follows the signaling structure of Broadband ISDN (B‐ISDN) User–Network Interface (UNI), thus offering the possibility for integration of the wireless ATM access system into fixed B‐ISDN. It is shown that the use of the proposed access signaling architecture provides cost effective implementations without degrading the agreed Quality of Service (QoS), and simplifies call/connection and handover control. The evaluation of the proposed access signaling protocol structure yields results that fall within acceptable ATM signaling performance measures. A performance comparison of our approach with an alternative access signaling configuration is also carried out to quantify the relative gains. This revised version was published online in August 2006 with corrections to the Cover Date.  相似文献   

5.
A secure authentication and billing architecture for wireless mesh networks   总被引:2,自引:0,他引:2  
Wireless mesh networks (WMNs) are gaining growing interest as a promising technology for ubiquitous high-speed network access. While much effort has been made to address issues at physical, data link, and network layers, little attention has been paid to the security aspect central to the realistic deployment of WMNs. We propose UPASS, the first known secure authentication and billing architecture for large-scale WMNs. UPASS features a novel user-broker-operator trust model built upon the conventional certificate-based cryptography and the emerging ID-based cryptography. Based on the trust model, each user is furnished with a universal pass whereby to realize seamless roaming across WMN domains and get ubiquitous network access. In UPASS, the incontestable billing of mobile users is fulfilled through a lightweight realtime micropayment protocol built on the combination of digital signature and one-way hash-chain techniques. Compared to conventional solutions relying on a home-foreign-domain concept, UPASS eliminates the need for establishing bilateral roaming agreements and having realtime interactions between potentially numerous WMN operators. Our UPASS is shown to be secure and lightweight, and thus can be a practical and effective solution for future large-scale WMNs. Yanchao Zhang received the B.E. degree in Computer Communications from Nanjing University of Posts and Telecommunications, Nanjing, China, in July 1999, and the M.E. degree in Computer Applications from Beijing University of Posts and Telecommunications, Beijing, China, in April 2002. Since September 2002, he has been working towards the Ph.D. degree in the Department of Electrical and Computer Engineering at the University of Florida, Gainesville, Florida, USA. His research interests are network and distributed system security, wireless networking, and mobile computing, with emphasis on mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and heterogeneous wired/wireless networks. Yuguang Fang received the BS and MS degrees in Mathematics from Qufu Normal University, Qufu, Shandong, China, in 1984 and 1987, respectively, a Ph.D degree in Systems and Control Engineering from Department of Systems, Control and Industrial Engineering at Case Western Reserve University, Cleveland, Ohio, in January 1994, and a Ph.D degree in Electrical Engineering from Department of Electrical and Computer Engineering at Boston University, Massachusetts, in May 1997. From 1987 to 1988, he held research and teaching position in both Department of Mathematics and the Institute of Automation at Qufu Normal University. From September 1989 to December 1993, he was a teaching/research assistant in Department of Systems, Control and Industrial Engineering at Case Western Reserve University, where he held a research associate position from January 1994 to May 1994. He held a post-doctoral position in Department of Electrical and Computer Engineering at Boston University from June 1994 to August 1995. From September 1995 to May 1997, he was a research assistant in Department of Electrical and Computer Engineering at Boston University. From June 1997 to July 1998, he was a Visiting Assistant Professor in Department of Electrical Engineering at the University of Texas at Dallas. From July 1998 to May 2000, he was an Assistant Professor in the Department of Electrical and Computer Engineering at New Jersey Institute of Technology, Newark, New Jersey. In May 2000, he joined the Department of Electrical and Computer Engineering at University of Florida, Gainesville, Florida, where he got early promotion to Associate Professor with tenure in August 2003, and to Full Professor in August 2005. His research interests span many areas including wireless networks, mobile computing, mobile communications, wireless security, automatic control, and neural networks. He has published over one hundred and fifty (150) papers in refereed professional journals and conferences. He received the National Science Foundation Faculty Early Career Award in 2001 and the Office of Naval Research Young Investigator Award in 2002. He also received the 2001 CAST Academic Award. He is listed in Marquis Who’s Who in Science and Engineering, Who’s Who in America and Who’s Who in World. Dr. Fang has actively engaged in many professional activities. He is a senior member of the IEEE and a member of the ACM. He is an Editor for IEEE Transactions on Communications, an Editor for IEEE Transactions on Wireless Communications, an Editor for IEEE Transactions on Mobile Computing, an Editor for ACM Wireless Networks, and an Editor for IEEE Wireless Communications. He was an Editor for IEEE Journal on Selected Areas in Communications: Wireless Communications Series, an Area Editor for ACM Mobile Computing and Communications Review, an Editor for Wiley International Journal on Wireless Communications and Mobile Computing, and Feature Editor for Scanning the Literature in IEEE Personal Communications. He has also actively involved with many professional conferences such as ACM MobiCom’02 (Committee Co-Chair for Student Travel Award), MobiCom’01, IEEE INFOCOM’06, INFOCOM’05 (Vice-Chair for Technical Program Committee), INFOCOM’04, INFOCOM’03, INFOCOM’00, INFOCOM’98, IEEE WCNC’04, WCNC’02, WCNC’00 (Technical Program Vice-Chair), WCNC’99, IEEE Globecom’04 (Symposium Co-Chair), Globecom’02, and International Conference on Computer Communications and Networking (IC3N) (Technical Program Vice-Chair).  相似文献   

6.
The convergence of real-time multimedia applications, the increasing coverage of heterogeneous wireless networks and the ever-growing popularity of mobile devices are leading to an era of mobile human-centric multimedia services. In this scenario, heterogeneous communications will co-exist and ensure that the end-user is always best connected. The rigorous networking demands of wireless multimedia systems, beyond quality-oriented control strategies, are necessary to guarantee the best user experience over time. Therefore, the Quality of Experience (QoE) support, especially for 2D or 3D videos in multi-operator environments, remains a significant challenge and is crucial for the success of multimedia systems. This paper proposes a QoE Handover Architecture for Converged Heterogeneous Wireless Networks, called QoEHand. QoEHand extends the Media Independent Handover (MIH)/IEEE 802.21 with QoE-awareness, seamless mobility and video adaptation by integrating a set of QoE-based decision-making modules into MIH, namely a video quality estimator, a dynamic class of service mapping and content adaptation schemes. The QoEHand video estimator, mapping and adaptation components operate by coordinating information about video characteristics, available wireless resources in IEEE 802.11e and IEEE 802.16e service classes, and QoE-aware human experience. The video quality estimator works without the need for any decoding, which saves time and minimises processing overheads. Simulations were carried out to show the benefits of QoEHand and its impact on user perception by using objective and subjective QoE metrics.  相似文献   

7.
任宏 《信息技术》2016,(4):162-167,170
在LTE与WSN异构无线网络架构中,有效降低信道接入时的碰撞概率从而提高网络容量吞吐量是影响异构无线网络性能的关键因素。文中建立混合接入模型及超帧结构,完成时分复用结构下的冲突避免,降低了WSN网络的能量消耗。通过时隙优化机制,解决当接入簇首的LTE UE数量变化频繁时竞争时隙配置不合理所导致的网络资源浪费。仿真结果表明,随着LTE UE的数量的增加,协作机制的性能优于传统的随机竞争接入机制,且协作机制的吞吐量性能呈现线性增长。当接入时隙相对充足簇资源利用趋向饱和时,接入概率和网络吞吐量性能均可保持稳定。  相似文献   

8.
《无线互联科技》2018,(8):26-28
一种应对5G通信中无线流量爆炸的方法,是部署大量小蜂窝来生成异构无线网络(Het Nets)。Het Nets除传统的宏蜂窝外,其蜂窝由发射功率较低的小蜂窝组成。通过部署低功率小型基站,网络容量得到了改善,覆盖范围也扩大到覆盖漏洞。此外,所有小型、微微、毫微微蜂窝与现有宏蜂窝的重叠,导致频率复用的改善和有效性的提高。文章讨论了5G网络中Het Nets的现状,云无线接入网络(C-RAN)和异构C-RAN(H-CRAN),C-RAN的试验和H-CRAN的提案。  相似文献   

9.
为使异构分层无线网络能服务更多的移动用户,提出了一种基于逗留时间的动态流量均衡算法.该算法首先根据用户移动模型计算其在小区内的逗留时间,然后基于小区呼叫到达率和重叠覆盖小区的流量状态来确定一个周期内呼叫转移的数量,最后依据逗留时间门限值将重负载小区中满足条件的呼叫转移到轻负载的重叠覆盖小区中.为降低切换呼叫掉线率,还对异构网间的呼叫切换策略做了改进.仿真实验结果表明,本算法在新呼叫阻塞率和切换呼叫掉线率等性能指标上比传统方法有显著的提高.  相似文献   

10.
In heterogeneous wireless access networks, each mobile terminal may frequently need to change its base station (BS); this change is called a ‘handoff’. BSs have static parameters, which are related to their radio access technologies (RATs); however, they also contain dynamic parameters such as load and signal quality. Therefore, the problem of handoff decision includes two subproblems of RAT selection and BS selection. In this paper, first a ‘heterogeneous handoff management system’ for gathering all different required parameters is proposed. Second, a RAT Selection algorithm based on analytic hierarchy process and a BS Selection algorithm based on data envelopment analysis are designed. Finally, by means of ‘weight restriction’ technique, we develop a method for studying the impact of RAT Selection parameters on the performance of the network. Simulation results indicate that RAT Selection parameters have significant impact on the bandwidth utilization, energy consumption and the whole satisfaction of the users in heterogeneous wireless access networks.Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

11.
针对现有异构无线网络基于模糊逻辑及神经网络的接入选择方法未能合理考虑网络负载状况的问题,提出一种基于RBF(径向基函数)模糊神经网络的接入选择方法.该方法以可接入网络的接入阻塞率相等为模糊神经网络参数强化学习的目标,对网络负载程度具有很好的动态适应性,实现了智能化的接入判决.仿真结果表明,该方法能有效均衡异构无线网络间的负载,保障实时与非实时业务的QoS,并且相对于负载均衡算法(MLB算法)降低了网络的接入阻塞率.  相似文献   

12.
结合信道借用和流量转移技术提出了一种混合动态流量均衡算法。使用该算法热点小区可以向紧凑模式中的同类型轻负载小区借用信道,同时还可以按一定条件将呼叫转移到与热点小区重叠覆盖的异构轻负载小区中,每个流量周期借用的信道数和转移的呼叫数将根据热点小区的剩余可用信道数和新呼叫到达率来计算。仿真结果表明,该流量均衡算法能够显著降低热点小区系统和整个异构系统的新呼叫阻塞概率、切换呼叫掉线率,而且整个异构系统的利用率也得到了相应提高。  相似文献   

13.
Due to the ease of deployment and low cost, wireless mesh networks have been deployed in many metropolitan areas and business units. How to establish secure communications among the communication entities such as mesh routers and mobile clients (or mesh clients) even when roaming to different mesh networks (called mesh domains) is a challenging task. In this paper, we leverage the ID-based cryptography and propose a novel secure architecture to enable secure communications in large-scale multi-domain wireless mesh networks. Under this architecture, mesh clients can conveniently gain services securely even when roaming.  相似文献   

14.
为了在将来实现个人通信的目标,必须在开发更多频段的同时,使已开发的频带资源更有效地为用户服务,不同的无线通信系统就必须协同工作形成一个异构无线通信环境。文章在介绍异构无线网络相关概念的基础上,着重研究了异构无线接入网络的组网结构问题并提出了组网建议。最后,对异构网络的选择问题进行了初步的探讨。  相似文献   

15.
The rapid advance of wireless and portable computing technology has brought a lot of research interests and momentum to the area of mobile computing. One of the research focus is on pervasive data access. With wireless connections, users can access information at any place at any time. However, various constraints such as limited client capability, limited bandwidth, weak connectivity, and client mobility impose many challenging technical issues. In the past years, tremendous research efforts have been put forth to address the issues related to pervasive data access. A number of interesting research results were reported in the literature. This survey paper reviews important works in two important dimensions of pervasive data access: data broadcast and client caching. In addition, data access techniques aiming at various application requirements (such as time, location, semantics and reliability) are covered. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   

16.
Emerging technologies are transforming the workflows in healthcare enterprises. Computing grids and handheld mobile/wireless devices are providing clinicians with enterprise-wide access to all patient data and analysis tools on a pervasive basis. In this paper, emerging technologies are presented that provide computing grids and streaming-based access to image and data management functions, and system architectures that enable pervasive computing on a cost-effective basis. Finally, the implications of such technologies are investigated regarding the positive impacts on clinical workflows.  相似文献   

17.
王学婷  朱琦 《信号处理》2017,33(2):168-177
分层异构网络中家庭基站与宏基站之间往往存在干扰,如何分配资源以获得高谱率和高容量、保证用户性能一直是研究的重点。为了解决这个问题,本文提出了一种异构蜂窝网络中基于斯坦克尔伯格博弈的家庭基站与宏基站联合资源分配算法,算法首先基于图论的分簇算法对家庭基站和宏用户进行分簇和信道分配,以减少家庭基站之间的同层干扰和家庭基站层与宏蜂窝网络的跨层干扰;然后建立了联合家庭基站发射功率以及宏用户接入选择的斯坦克尔伯格博弈,推导出达到纳什均衡时的家庭基站发射功率的表达式,并据此为宏用户选择合适的接入策略。仿真结果表明,该算法能够有效地提高宏用户的信干噪比(SINR),家庭用户的性能也得到改善。   相似文献   

18.
19.
Wireless Sensor Networks (WSNs) represent a key technology for collecting important information from different sources in context-aware environments. Unfortunately, integrating devices from different architectures or wireless technologies into a single sensor network is not an easy task for designers and developers. In this sense, distributed architectures, such as service-oriented architectures and multi-agent systems, can facilitate the integration of heterogeneous sensor networks. In addition, the sensors’ capabilities can be expanded by means of intelligent agents that change their behavior dynamically. This paper presents the Hardware-Embedded Reactive Agents (HERA) platform. HERA is based on Services laYers over Light PHysical devices (SYLPH), a distributed platform which integrates a service-oriented approach into heterogeneous WSNs. As SYLPH, HERA can be executed over multiple devices independently of their wireless technology, their architecture or the programming language they use. However, HERA goes one step ahead of SYLPH and adds reactive agents to the platform and also a reasoning mechanism that provides HERA Agents with Case-Based Planning features that allow solving problems considering past experiences. Unlike other approaches, HERA allows developing applications where reactive agents are directly embedded into heterogeneous wireless sensor nodes with reduced computational resources.  相似文献   

20.
Guaranteed quality-of-service wireless access to ATM networks   总被引:2,自引:0,他引:2  
We study the problem of wireless access to asynchronous transfer modes (ATMs). We consider three classes of ATM sources: constant bit rate (CBR), variable bit rate (VBR), and available bit rate (ABR). We propose a polling scheme with nonpreemptive priority. Under such a scheme, we derive sufficient conditions such that all the CBR sources satisfy their jitter constraints and all the VBR sources satisfy their delay constraints. The remaining bandwidth is used by the ABR sources, for which we adapt a random access scheme proposed by Chen and Lee (1994). For this random access scheme, we derive the throughput-offer load characteristic, and thus the capacity. Based on this, we propose adaptive random access schemes that track the offer load to its optimal value. Our simulations show that our adaptive schemes maintain a high throughput with respect to the whole range of system load  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号