hybrid access
Recently Published Documents


TOTAL DOCUMENTS

210
(FIVE YEARS 32)

H-INDEX

14
(FIVE YEARS 2)

Sensors ◽  
2021 ◽  
Vol 21 (20) ◽  
pp. 6832
Author(s):  
Shantanu Pal ◽  
Zahra Jadidi

Internet of Things (IoT) applications and services are becoming more prevalent in our everyday life. However, such an interconnected network of intelligent physical entities needs appropriate security to sensitive information. That said, the need for proper authentication and authorization is paramount. Access control is in the front line of such mechanisms. Access control determines the use of resources only to the specified and authorized users based on appropriate policy enforcement. IoT demands more sophisticated access control in terms of its usability and efficiency in protecting sensitive information. This conveys the need for access control to serve system-specific requirements and be flexibly combined with other access control approaches. In this paper, we discuss the potential for employing protocol-based and hybrid access control for IoT systems and examine how that can overcome the limitations of traditional access control mechanisms. We also focus on the key benefits and constraints of this integration. Our work further enhances the need to build hierarchical access control for large-scale IoT systems (e.g., Industrial IoT (IIoT) settings) with protocol-based and hybrid access control approaches. We, moreover, list the associated open issues to make such approaches efficient for access control in large-scale IoT systems.


Author(s):  
Hong-Sik Kim ◽  
Inwhee Joe

AbstractHybrid access point (HAP) is a node in wireless powered communication networks (WPCN) that can distribute energy to each wireless device and also can receive information from these devices. Recently, mobile HAPs have emerged for efficient network use, and the throughput of the network depends on their location. There are two kinds of metrics for throughput, that is, sum throughput and common throughput; each is the sum and minimum value of throughput between a HAP and each wireless device, respectively. Likewise, two types of throughput maximization problems can be considered, sum throughput maximization and common throughput maximization. In this paper, we focus on the latter to propose a deep learning-based methodology for common throughput maximization by optimally placing a mobile HAP for WPCN. Our study implies that deep learning can be applied to optimize a complex function of common throughput maximization, which is a convex function or a combination of a few convex functions. The experimental results show that our approach provides better performance than mathematical methods for smaller maps.


Author(s):  
Xiaoying Lei ◽  
Xiangjin Chen ◽  
Seung Hyong Rhee

AbstractVehicular Ad-hoc Networks (VANETs) can improve the road safety by transmitting safety-critical messages such as beacons and emergency messages. IEEE 802.11p VANETs have adopted the carrier sense multiple access with collision avoidance (CSMA/CA) mechanism for the multiple access control. The 802.11p media access control (MAC) protocol, however, can not guarantee the reliability of broadcasting data, since the reception of transmitted messages are not acknowledged. Moreover, the backoff scheme of the 802.11p MAC utilizes a fixed-size contention window for safety message broadcasting, which causes high collision probabilities especially in dense environments. In order to improve such drawbacks, we propose a hybrid access method as follows: Nodes are equipped to reserve time slots for the next round of broadcasting, while unoccupied time slots are preserved for those which have emergency needs. In addition, implicit feedbacks are enabled for detecting collisions incurred during random channel accesses in preserved time slots. We devise a mathematical model which optimally controls the parameters of our scheme while minimizes the cost caused by idle channels and collisions. Extensive simulations show that our mechanism can remarkably improve the performance of VANETs in broadcasting of the safety messages.


Mathematics ◽  
2021 ◽  
Vol 9 (4) ◽  
pp. 348
Author(s):  
M. Rehan Usman ◽  
M. Arslan Usman ◽  
Soo Young Shin ◽  
Gandeva Bayu Satrya ◽  
Rizwan A. Naqvi ◽  
...  

In heterogeneous networks (HetNets), non-orthogonal multiple access (NOMA) has recently been proposed for hybrid-access small-cells, promising a manifold network capacity compared to OMA. One of the major issues with the installation of a hybrid-access mechanism in small-cells is the cross-tier interference (intercell interference (ICI)) caused by the macrocell users (MUs) that are unable to establish a connection to the small-cell base station (SBS). In this paper, a joint strategy is proposed for hybrid-access small-cells using the Walsh–Hadamard transform (WHT) with NOMA and interference rejection combining (IRC) to achieve high performance gains and mitigate intercell interference (ICI), respectively. WHT is applied mathematically as an orthogonal variable spreading factor (OVSF) to achieve diversity in communication systems. When applied jointly with NOMA, it ensures better performance gains than the conventional NOMA. It reduces the bit error rate (BER) and enhances subsequent throughput performance of the system. IRC is used at the receiver side for managing the cross-tier interference caused by MUs that are unable to connect to the small-cell base station (SBS) for hybrid-access. The work considers both ideal and nonideal successive interference cancellation (SIC) conditions for NOMA. Mathematical modeling is provided for the proposed joint strategy for HetNets and the results validate it in terms of BER and subsequent user throughput performance, compared to the conventional NOMA approach.


Author(s):  
Toktam Mahmoodi ◽  
Stephen H. Johnson ◽  
Massimo Condoluci ◽  
Vicknesan Ayadurai ◽  
Maria A. Cuevas ◽  
...  

This chapter discusses the ongoing work around hybrid access and network convergence, with particular emphasis on recent works on ATSSS in 3GPP. Three main aspects are analyzed: policy enforcement, integration with 5G QoS framework, interaction with underlying multi-path transport protocol. The chapter also provides some preliminary testbed results showing the benefits of ATSSS in the management of multiple accesses analyzing some primary performance indicators such as achievable data rates, link utilization for aggregated traffic, and session setup latency. The chapter also provides some results by considering two examples of realization of ATSSS policies to avoid inefficiency in link utilization and to allow the fulfillment of data rate requirements.


Sign in / Sign up

Export Citation Format

Share Document