Machine-to-Machine (M2M) communications is one of the key enablers of the Internet of Things (IoT). Billions of devices are expected to be deployed in the near future for novel M2M applications demanding ubiquitous access and global connectivity. In order to cope with the massive number of machines, there is a need for new techniques to coordinate the access and allocate the resources. Although the majority of the proposed solutions are focused on the adaptation of the traditional cellular networks to the M2M traffic patterns, novel approaches based on the direct communication among nearby devices may represent an effective way to avoid access congestion and cell overload. In this paper, we propose a new strategy inspired by the classical Trunked Radio Systems (TRS), exploiting the Device-to-Device (D2D) connectivity between cellular users and Machine-Type Devices (MTDs). The aggregation of the locally generated packets is performed by a user device, which aggregates the machine-type data, supplements it with its own data and transmits all of them to the Base Station. We observe a fundamental trade-off between latency and the transmit power needed to deliver the aggregate traffic, in a sense that lower latency requires increase in the transmit power.Index Terms-D2D, M2M, trunking, TDMA IEEE ICC 2015 -Mobile and Wireless Networking Symposium 978-1-4673-6432-4/15/$31.00 ©2015 IEEE
The successful deployment of safe and trustworthy Connected and Autonomous Vehicles (CAVs) will highly depend on the ability to devise robust and effective security solutions to resist sophisticated cyber attacks and patch up critical vulnerabilities. Pseudonym Public Key Infrastructure (PPKI) is a promising approach to secure vehicular networks as well as ensure data and location privacy, concealing the vehicles' real identities. Nevertheless, pseudonym distribution and management affect PPKI scalability due to the significant number of digital certificates required by a single vehicle. In this paper, we focus on the certificate revocation process and propose a versatile and low-complexity framework to facilitate the distribution of the Certificate Revocation Lists (CRL) issued by the Certification Authority (CA). CRL compression is achieved through optimized Bloom filters, which guarantee a considerable overhead reduction with a configurable rate of false positives. Our results show that the distribution of compressed CRLs can significantly enhance the system scalability without increasing the complexity of the revocation process.
Machine-to-Machine (M2M) communications are gaining momentum due to the rapid deployment of smart devices with self-organizing capabilities, able to interact each other without the human operator support. Ultimately, M2M paradigm allows Machine-Type Communication Devices (MTCD) to exchange data in Peer-to-Peer (P2P) mode, avoiding the need of a core network handling end-to-end communication establishment between two machines. To this end, the recent Device-to-Device (D2D) feature, introduced by the Third Generation Partnership Project (3GPP) Release 12, fosters new types of service based on the device proximity concept and helps to offload cellular networks by enabling direct-mode communications among cellular users. Furthermore, D2D is also considered a suitable technology to fully support M2M communications thanks to the reduced power consumption and the hop gain.In this paper we first review crucial aspects of M2M communications and examine major issues involving terminals operating in D2D mode in LTE-A networks. Then, a multi-hop D2D communication scheme is proposed in order to enhance endto-end connectivity among devices in a proximity area within an LTE-A cell. We also describe a promising resource allocation approach aware of the multi-hop D2D network configuration, able to fulfil bandwidth requests of all the cooperating devices, according to the related role in the network set-up.
Connected and Autonomous Vehicles (CAVs) will play a crucial role in next-generation Cooperative Intelligent Transportation Systems (C-ITSs). Not only is the information exchange fundamental to improve road safety and efficiency, but it also paves the way to a wide spectrum of advanced ITS applications enhancing efficiency, mobility and accessibility. Highly dynamic network topologies and unpredictable wireless channel conditions entail numerous design challenges and open questions. In this paper, we address the beneficial interactions between CAVs and an ITS and propose a novel architecture design paradigm. Our solution can accommodate multi-layer applications over multiple Radio Access Technologies (RATs) and provide a smart configuration interface for enhancing the performance of each RAT.
The provision of high data rate services to mobile users combined with improved quality of experience (i.e., zero latency multimedia content) drives technological evolution towards the design and implementation of fifth generation (5G) broadband wireless networks. To this end, a dynamic network design approach is adopted whereby network topology is configured according to service demands. In parallel, many private companies are interested in developing their own 5G networks, also referred to as non-public networks (NPNs), since this deployment is expected to leverage holistic production monitoring and support critical applications. In this context, this paper introduces a 5G NPN architectural approach, supporting among others various key enabling technologies, such as cell densification, disaggregated RAN with open interfaces, edge computing, and AI/ML-based network optimization. In the same framework, potential applications of our proposed approach in real world scenarios (e.g., support of mission critical services and computer vision analytics for emergencies) are described. Finally, scalability issues are also highlighted since a deployment framework of our architectural design in an additional real-world scenario related to Industry 4.0 (smart manufacturing) is also analyzed.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.