Abstract: Remarkable progress has been made in intelligent transportation systems. For
example, autonomous vehicles can now detect their positions, as well as those
of other vehicles, pedestrians, and obstacles. Pedestrians with smartphones
can also determine their positions and send this information to the Internet.
However, even though vehicles and pedestrians can instantly determine their
positions, the information used for this purpose is rarely sent to a cloud service.
Here, we propose a new cloud service, called “cyber parallel traffic world”
(CPTW), in which vehicles, pedestrians, and temporary obstacles exist and
move in synchronization with their real-world counterparts. In addition, virtual
vehicles and pedestrians in the CPTW can communicate with real/virtual
vehicles and pedestrians. The CPTW service could make driving safer and
less stressful; provide people with experience in driving on roads throughout
the world, etc. We describe how to construct its virtual world and establish
communications.
Keywords: ITS, smart mobility, cloud service, safety drive, virtual world,
5G mobile networks, Internet of Things, IOT.
Abstract: The current situation of technology separation among the different application
domains of the Internet of Things (IoT) results in a market separation per application
domain. This issue hinders the technical innovation and investments
in the IoT business. In order to solve the issue, it is necessary to standardize
common technologies of the IoT across the different application domains. This
paper argues that a key direction of the future standardization of the IoT, in
addition to standardizing specific technologies, is building over a standardized
new architecture reference model for the IoT. Based on the analysis of existing
key activities concerning the standardization of OSI, NGN and IoT from a
functional architecture perspective, it suggests that the IoT standardization
work be progressed in an evolutionary way in order to enable the integration of
existing technologies, and focus on the interactions among functional entities
or deployable components of the IoT to impose minimum constraints on future
technical innovations. Topics discussed in the paper include characteristic
capabilities of the IoT, ways of integrating the cloud computing technologies
in the IoT perspective, and challenges faced by the IoT standardization work.
Journal of
Keywords: architecture reference model, functional entity, interaction, Internet
of Things, Next Generation Network, Open System Interconnection,
standardization.
Optimisation of a TV White Space Broadband Market Model for Rural Entrepreneurs doi: https://doi.org/10.13052/jicts2245-800X.223
Sindiso M Nleya1, Antoine Bagula2, Marco Zennaro3
and Ermmano Pietrosemoli3
1University of Cape Town, ISAT Lab, South Africa,
2University of Western Cape, ISAT Lab, South Africa
3The Abdus Salam International Centre for Theoretical Physics mzenarro, Italy
Abstract: [+] | Download File [ 1215KB ] | Read Article Online
Abstract: Leveraging on recent TV white space communications developments in regulations,
standards initiatives and technology, this paper considers a suitable
next generation network comprising of two primary users (PUs) that compete
to offer a service to a group of secondary users (SUs) in the form of
mesh routers that belong to different entrepreneurs participating in a noncooperative
TV white space trading. From a game theoretic perspective the
non-cooperative interaction of the PUs is viewed as a pricing problem wherein
each PU strives to maximize its own profit. Subsequently the problem is
formulated as a Bertrand game in an oligopolistic market where the PUs are
players who are responsible for selling TV white spectrum in the market while
the SUs are the players who are the buyers of the TV white spectrum. The PUs
strategise by way of price adjustment, so much such that SUs tend to favour
the lowest price when buying. The inter- operator agreements are based on
the delay and throughput QoS performance optimization metrics respectively.
A performance evaluation of both models is comparatively performed with
regards to parameters such as cost, generated revenue, profit, best response in price adjustments and channel quality. The throughput based analytic model
fares better in terms of providing channel quality as it has a better strategy
which is a decreased price value.
Keywords: White Spaces, Smart Radio, Non-Cooperative, Optimization,
Game Theory, Broadband Market, Traffic Engineering.
Abstract: Free space optical (FSO) communication has been receiving growing attention
with recent commercialization successes as a cost-effective and high bandwidth
optical access technique. Meanwhile, FSO communication has been
regard as an attractive solution to bridging the gap between the wireless
communications and optical fiber communications. However, a significant
performance degradation in FSO communication system due to the atmospheric
turbulence impairs the transmission performance improvement. FSO
system employing the spatial diversity technique can be used to mitigate
the effect of turbulence and improve the transmission performance. In this
paper, a novel analytical approach is presented to evaluate the transmission
performance of OFDM-FSO system with diversity reception considering
effect of channel correlation.Adetailed mathematical model for OFDM-FSO
system over turbulent channel modeled by correlated Log-normal distribution
is provided. Then, We derive the signal-to-noise ratio (SNR), bit error ratio
(BER) and outage probability expressions taking into account the diversity
combining schemes (i.e. MRC, EGC), effects of atmospheric turbulence,
channel correlation and aperture size of receiver lens. The results of this study show that the most significant parameters that degrade the system
performance. Furthermore, the obtained numerical results can be useful for
designing, evaluating and enhancing the FSO system’s ability to transmit
wireless signal under actual conditions.
Keywords: Free Space Optical (FSO), Orthogonal Frequency Division
Multiplexing (OFDM), spatial diversity, channel correlation, atmospheric
turbulence, Maximum Ratio Combining (MRC), Equal Gain Combining
(EGC).
Abstract: Several Future Internet (FI) architectures have been proposed to address
the problems of the Internet including flexibility (so called IP bottleneck),
host-based addressing (addressing a host rather than the content itself), and
security. In the beginning of this article, we survey the security solutions of
seven FI architectures, namely XIA, RINA, NENA, SONATE, Mobility-First,
NDN, and SONATE, based on literatures, prototypes, and demonstrations. It
has been found that none of the architectures can fulfill all of the security
goals: confidentiality, authentication, integrity and availability. Further in this
article, we focus on eXpressive Internet Architecture (XIA) as it is the most
secure and open-source Content-Centric Network (CCN). CCN is claimed
by the Future Content Networks (FCN) Group to be the Future Internet.
However, XIA does not have any mechanisms to mitigate the replaying
attack, thus, this article proposes and implements a solution to mitigate it.
Several existing solutions have been analyzed to derive the requirements for
the proposed solution. By implementing the proposed protocol, XIA is now
able to mitigate all of the reviewed network attacks. The evaluation shows
that the proposed solution is more secure and less complex over the existing
solutions.
Keywords: Replaying Attack, Session Key, eXpressive Internet Architecture
(XIA), Future Internet (FI), CCN.
Abstract: The explosion of mobile broadband growth has created a greater demand on
the operators and vendors working together to place more and more telecom
gears into wireless networks at a record pace to satisfy the users’ insatiable
appetite for mobile data. The desire for undiminished security coupled with
more sophisticated attacks in an ICT world where the traditionally closed
telecom networks are going through a change of open architecture, open
platform, and virtualization, the entire telecommunication community has
taken a proactive approach to re-evaluate the security assurance process to
ensure that the products are as secure as ever. The operators and the vendors
have come together under the roof of 3GPP to create such a security assurance
standards to be applied, recognized, and accepted in all areas for which 3GPP
network products are sold and marketed. This paper will examine the many
issues, hurdles, and challenges of the standardization of security assurance.
Keywords: Security Assurance, 3GPP, standards.