International audienceThis paper presents a new cross-layer (PHY/MAC) resource allocation scheme based on Multiple Input Multiple Output (MIMO) and Orthogonal Frequency Division Multiple Access (OFDMA) system with a multi-service (MS) and a multiuser (MU) configuration. It is about a downlink transmission chain based on the IEEE 802.16m specifications, in which the available resources (power and bandwidth) are dynamically allocated according to the system parameters such as Channel State Information (CSI), spectral efficiency, error code corrector rate, Quality of Service (QoS) requirements and services scheduling. The specificity of our system is the joint parameterization of these elements according to the total power and threshold rate constraints in order to guarantee a good trade-off between users QoS requirements and sub-carriers distribution. Simulation results show that the proposed scheme offers better performances in terms of average throughput and users satisfaction than previous resource allocation schemes
International audienceCross-layer strategies for resource allocation in wireless networks are essential to guaranty an efficient utilization of the scarce resource. In this paper, we present an efficient radio resource allocation scheme based on PHY/MAC cross layer design and QoS-guaranteed scheduling for multi-user (MU), multi-service (MS), multi-input multi-output (MIMO) concept, orthogonal frequency division multiple access (OFDMA) systems. It is about a downlink multimedia transmission chain in which the available resources as power and bandwidth, are dynamically allocated according to the system parameters. Among these parameters, we can mention the physical link elements such as channel state information, spectral efficiency and error code corrector rate, and MAC link variables, which correspond to the users QoS requirements and the queue status. Primarily, we use a jointly method which parametrizes these system parameters, according to the total power, and the bit error rate constraints. Secondly, we propose a QoS-guaranteed scheduling that shares the sub-carriers to the users. These users request several type of traffic under throughput threshold constraints. The main objective in this work is to adjust the average throughput per service of each user, according to their needs and likewise to satisfy a great number of connexions. Subsequently, we consider a model of moderated compartmentalization between various classes of services by partitioning the total bandwidth into several parts. Each class of service will occupy a part of the bandwidth and will be transmitted over a maximum number of sub-carriers. The simulation results show that the proposed strategy provides a more interesting performance improvement (in terms of average data rate and user satisfaction) than other existing resource allocation schemes, such as nonadaptive resource allocation strategy. The performances are also analyzed and compared for the two multi-service multi-user MIMO–OFDMA systems; with sub-carriers partitioning and without sub-carriers partitioning
This paper presents an original and strong authentication method for cloud services from smartphones. It is based on a two-factor scheme improved by the diversity of devices and network channels. It combines an OTP 1 -based approach using an IoT 2 object as a secondary device. Authentication factors are transmitted over different channels implementing distinct protocol stacks (LTE 3 , LPWAN 4 , ...). The proposal uses end-to-end encryption for the transfer of sensitive data. An experimental application of the method is illustrated by analyzing authorization access issues to cloud services located in a trusted zone. A platform developed to test the approach is briefly presented.
This paper introduces an original and strong authentication method using a two-factor scheme enhanced by network channels and devices diversity. The proposed solution combines an OTP-based approach using an IoT object as secondary device in addition to the mobile phone. Authentication factors are transmitted over different channels (LTE, LPWAN, ...) via different devices thus greatly reducing the attack surface. To avoid depending on the protocol security specificities used to instantiate a channel, we use a security layer ensuring end-toend encryption of the transferred sensitive contents. In addition, diversity can be leveraged by exploiting its inherent modularity to infer other approaches. We give an example of another authentication method equivalent for the robustness to the first one but which is more ergonomic and user friendly.
Modern portable devices such as smartphones are enhanced by advanced functionalities and may therefore soon become both the preferred portable computing device (thereby substituting laptops) and the personal trusted device. They are also increasingly used to access to online cloud services, including those particularly sensitive which require high security. This paper introduces an original and strong authentication method for mobiles. It involves a two factor scheme enhanced through network channels and devices diversity. Our solution combines an OTP-based approach using an IoT object as secondary device in addition to the smartphone. The diversity of the network's channels rests on the use of one of the LPWAN networks together with LTE or WIFI networks. Authentication factors are therefore transmitted over different channels through different devices thus greatly reducing the attack surface. The proposal is also enhanced by end-to-end encryption of the transferred sensitive contents. The link with the authorization issues is analyzed and the integration of our approach to OpenID Connect/OAuth 2.0 is investigated. A platform that implements this scheme has been developed, tested and evaluated under different attack scenarios.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.