This book provides a comprehensive overview of wireless technologies for industrial network systems. The authors first describe the concept of industrial network systems and their application to industrial automation. They then go on to cover the role of sensing and control in industrial network systems, and the challenge of sensing and control in the industrial wireless environment. Then, the existing techniques for resource efficiency information transmission are introduced and studied. Afterward, the authors introduce sensing and control-oriented transmission for industrial network systems, which take advantage of spatial diversity gain to overcome the interference and fading, which in turn improves the transmission reliability without expending extra spectrum resources and enlarging the transmission delay. Subsequently, edge assisted efficient transmission schemes are introduced, which integrate the capacities of communication, computing, and control to relieve the contradiction of resource limitation and massive data. Finally, the authors discuss open research issues and future works about information transmission in industrial network systems.
This book provides a comprehensive investigation on new technologies for future vehicular networks. The authors propose different schemes to efficiently manage the multi-dimensional resources for supporting diversified applications. The authors answer the questions of why connected and automated vehicle technology should be considered; how the multi-access edge computing (MEC) and unmanned aerial vehicle (UAV) technologies can be helpful to vehicular networks; how to efficiently manage the multi-dimensional resources to support different vehicular applications with guaranteed quality-of-service (QoS) requirements; and how to adopt optimization and AI technologies to achieve resource management in vehicular networks. The book is pertinent to researchers, professionals, academics and students in vehicular technologies.
To support smart vehicular services especially in the future driverless era, the vehicular networks are expected to support high-bandwidth content delivery and reliable accessibility of multifarious applications. However, the limited radio spectrum resources, the inflexibility in accommodating dynamic traffic demands, and the geographically constrained fixed infrastructure deployment of current terrestrial networks pose great challenges in ensuring ubiquitous, flexible, and reliable network connectivity. This book investigates mobile edge content caching and delivery in heterogeneous vehicular networks (HetVNets) to provide better service quality for vehicular users with resource utilization efficiency enhancement. Specifically, this book introduces the background of HetVNets and mobile edge caching, provides a comprehensive overview of mobile edge caching-assisted HetVNet techniques in supporting vehicular content delivery, and proposes/designs mobile edge content caching and delivery schemes in different HetVNet scenarios respectively to enhance vehicular content delivery performance. Afterward, this book outlines open issues and research directions in future mobile edge caching-assisted space-air-ground integrated vehicular networks. The topics addressed in this book are crucial for both the academic community and industry, since mobile edge caching in heterogeneous networks has become an essential building block for the communication systems. The systematic principle of this book provides valuable insights on the efficient exploitation of heterogeneous network resources to fully unleash their differential merits in supporting vehicular applications. In addition, this book considers different HetVNet scenarios from terrestrial HetVNets to air-ground HetVNets and space-air-ground HetVNets, which can provide a general overview for interested readers with a comprehensive understanding of applying mobile edge caching techniques in enhancing vehicular content delivery performance, and offer a systematized view for researchers and practitioners in the field of mobile edge caching to help them design and optimize the desired vehicular content delivery systems. Provides in-depth studies on mobile edge content caching and delivery scheme design for three typical HetVNet scenarios; Comprehensively covers the analysis, design, and optimization of the mobile edge content caching-assisted HetVNets; Systematically addresses vehicle mobility, network service interruptions, and dynamic service request distribution issues in the mobile edge content caching and delivery.
The topics addressed in this book are crucial for both the academic community and industry, since the vehicular network has become an essential building block for intelligent transportation systems. The systematic principle of this book provides valuable guidance on the deployment and implementation of V2X-enabled road-safety applications. In addition, this book carries out structured technologies from the MAC layer to the link and network layer, which can provide a general introduction for interested readers with a comprehensive understanding of applying vehicular networks in enhancing road safety, and offers a systematized view for researchers and practitioners in the field of vehicular networks to help them optimize and improve the desired vehicular communication systems. Road safety has always been the first priority for daily commuters on the road. Vehicular networks can be an effective solution to enhance road safety, via which vehicles can exchange cooperative awareness messages rapidly, contributing to better situation awareness and maneuvering cooperation. However, with the fast-changing network topology, intermittent wireless link, and dynamic traffic density, it is challenging to achieve satisfying network performance. This book introduces the background of vehicular networks, provides a comprehensive overview of networking techniques in supporting road-safety applications, states the technical motivations per the MAC, link, and network layer, and proposes/designs vehicular networking technologies at the corresponding layer respectively to guarantee low-latency and reliable V2X communications for road-safety applications. By extending the proposed networking technologies to support all types of vehicular services, this book also outlines open issues and research directions in future 5G and beyond vehicular networks.
This monograph addresses the spectrum-scarcity problem by providing a comprehensive overview of spectrum resource management in Cognitive Radio Sensor Networks (CRSNs). It shows a variety of CRSN applications covering Machine-to-Machine communications, cyber physical systems and Internet-of-Things. The authors explore the benefits of an integrated energy efficient spectrum management solution for CRSNs including spectrum sensing, decision and allocation. Both theoretical and experimental aspects of CRSNs are covered in detail. Academics, researchers and developers will find this monograph an exceptional resource with valuable knowledge and insights. It also has extensive references from top journals, conference proceedings, books and standards.
This book presents the security and privacy challenges of the smart home following the logic of “terminal device – voice interface – application platform”. For each component, the authors provide answers to the three questions: 1) In the terminal device layer, how to conduct cross-layer privacy breach analysis and provide effective countermeasures; 2) In the voice interface layer, how to design effective and lightweight schemes to defend against voice spoofing; 3) In the application layer, how to design an effective anomaly detection system without breaching the application platform. The authors conduct a thorough analysis of the security threats and challenges in each component of the smart home, review the existing state-of-the-art solutions proposed by other researchers, and elaborate on proposed countermeasures. This book aims to provide both security threats analysis and state-of-the-art countermeasures for the smart home network.
This book provides a comprehensive overview of data security in cloud storage, ranging from basic paradigms and principles, to typical security issues and practical security solutions. It also illustrates how malicious attackers benefit from the compromised security of outsourced data in cloud storage and how attacks work in real situations, together with the countermeasures used to ensure the security of outsourced data. Furthermore, the book introduces a number of emerging technologies that hold considerable potential – for example, blockchain, trusted execution environment, and indistinguishability obfuscation – and outlines open issues and future research directions in cloud storage security. The topics addressed are important for the academic community, but are also crucial for industry, since cloud storage has become a fundamental component in many applications. The book offers a general introduction for interested readers with a basic modern cryptography background, and a reference guide for researchers and practitioners in the fields of data security and cloud storage. It will also help developers and engineers understand why some current systems are insecure and inefficient, and move them to design and develop improved systems.
This book covers the fundamental principles, new theories and methodologies, and potential applications of hybrid intelligent networks. Chapters focus on hybrid neural networks and networked multi-agent networks, including their communication, control and optimization synthesis. This text also provides a succinct but useful guideline for designing neural network-based hybrid artificial intelligence for brain-inspired computation systems and applications in the Internet of Things. Artificial Intelligence has developed into a deep research field targeting robots with more brain-inspired perception, learning, decision-making abilities, etc. This text devoted to a tutorial on hybrid intelligent networks that have been identified in nature and engineering, especially in the brain, modeled by hybrid dynamical systems and complex networks, and have shown potential application to brain-inspired intelligence. Included in this text are impulsive neural networks, neurodynamics, multiagent networks, hybrid dynamics analysis, collective dynamics, as well as hybrid communication, control and optimization methods. Graduate students who are interested in artificial intelligence and hybrid intelligence, as well as professors and graduate students who are interested in neural networks and multiagent networks will find this textbook a valuable resource. AI engineers and consultants who are working in wireless communications and networking will want to buy this book. Also, professional and academic institutions in universities and Mobile vehicle companies and engineers and managers who concern humans in the loop of IoT will also be interested in this book.
This book investigates the modeling and optimization issues in mobile social networks (MSNs). Firstly, the architecture and applications of MSNs are examined. The existing works on MSNs are reviewed by specifying the critical challenges and research issues. Then, with the introduction of MSN-based social graph and information dissemination mechanisms, the analytical model for epidemic information dissemination with opportunistic Links in MSNs is discussed. In addition, optimal resource allocation is studied based on a heterogeneous architecture, which provides mobile social services with high capacity and low latency. Finally, this book summarize some open problems and future research directions in MSNs. Written for researchers and academics, this book is useful for anyone working on mobile networks, network architecture, or content delivery. It is also valuable for advanced-level students of computer science.
“Power Grid Complexity” introduces the complex system theory known as self-organized criticality (SOC) theory and complex network theory, and their applications to power systems. It studies the network characteristics of power systems, such as their small-world properties, structural vulnerability, decomposition and coordination strategies, and simplification and equivalence methods. The book also establishes four blackout models based on SOC theory through which the SOC of power systems is studied at both the macroscopic and microscopic levels. Additionally, applications of complex system theory in power system planning and emergency management platforms are also discussed in depth. This book can serve as a useful reference for engineers and researchers working with power systems. Shengwei Mei is a Professor at the Department of Electrical Engineering at Tsinghua University, China. Xuemin Zhang is a Lecturer at the Department of Electrical Engineering at Tsinghua University, China. Ming Cao is an Assistant Professor at the Faculty of Mathematics and Natural Sciences at the University of Groningen, the Netherlands.
This book proposes secure schemes to address security challenges in secure automatic dependent surveillance-broadcast systems (ADS-B) from five different angles. First, the authors examine encryption schemes applied to the ADS-B environment for protecting messages confidentiality. Second, they propose an ADS-B broadcast authentication scheme with batch verification by employing an identity-based signature. Third, they present ADS-B broadcast authentication scheme based on a digital signature with message recovery, which provides a feature that the message is recoverable from the signature. Fourth, they propose a new cryptographic solution to ADS-B security. Finally, they propose an accurate and efficient cognitive aircraft location verification scheme preserving aircraft location privacy by utilizing a grid-based k-nearest neighbor algorithm. In summary, the authors show how ADS-B data links can greatly enhance flight safety by these proposed schemes without sacrificing data security. Proposes several secure schemes to address security challenges in secure automatic dependent surveillance-broadcast systems (ADS-B); Provides extensive experiments and evaluates the proposed schemes using real-world data; Shows how ADS-B data links can greatly enhance safety without sacrificing data security
This book shares valuable insights into high-efficiency data transmission scheduling and into a group intelligent search and rescue approach for artificial intelligence (AI)-powered maritime networks. Its goal is to highlight major research directions and topics that are critical for those who are interested in maritime communication networks, equipping them to carry out further research in this field. The authors begin with a historical overview and address the marine business, emerging technologies, and the shortcomings of current network architectures (coverage, connectivity, reliability, etc.). In turn, they introduce a heterogeneous space/air/sea/ground maritime communication network architecture and investigate the transmission scheduling problem in maritime communication networks, together with solutions based on deep reinforcement learning. To accommodate the computation demands of maritime communication services, the authors propose a multi-vessel offloading algorithm for maritime mobile edge computing networks. In closing, they discuss the applications of swarm intelligence in maritime search and rescue.
This SpringerBrief addresses the main security concerns for smart grid, e.g., the privacy of electricity consumers, the exchanged messages integrity and confidentiality, the authenticity of participated parties, and the false data injection attacks. Moreover, the authors demonstrate in detail the various proposed techniques to secure the smart grid’s different communication networks and preserve the privacy of the involved. Over many years, power grid has generated electricity from central generators and distributed it in one direction from the generation stations to end-users; also, information is one directional so that the grid’s control center doesn’t get enough information about customers’ requirements and consequently can’t prevent electricity losses. So, the electricity grid is merged with information and communication technology to form smart grid. The main target of this incorporation is to connect different parties of power grid to exchange information about grid conditions and customers’ requirements, and consequently, improve the reliability and efficiency of electricity generation and distribution. That upgrade of the power grid exposes it to the cyber security threats that the communication networks suffer from, such as malicious attacks to forge the electricity consumption readings or price, extract personal information for residential consumers, such as daily habits and life style, or attack some grid’s resources and equipment availability using denial-of-service attacks. Also, novel threats are introduced in smart grid due to the power grid nature, such as false data injection attack, in which the adversary compromises several measurement units and injects false information about the grid conditions that mislead the grid’s control center to make wrong decisions for the grid and consequently impact on its stability and efficiency.
This book provides a comprehensive review and in-depth study on efficient beamforming design and rigorous performance analysis in mmWave networks, covering beam alignment, beamforming training and beamforming-aided caching. Due to significant beam alignment latency between the transmitter and the receiver in existing mmWave systems, this book proposes a machine learning based beam alignment algorithm for mmWave networks to determine the optimal beam pair with a low latency. Then, to analyze and enhance the performance of beamforming training (BFT) protocol in 802.11ad mmWave networks, an analytical model is presented to evaluate the performance of BFT protocol and an enhancement scheme is proposed to improve its performance in high user density scenarios. Furthermore, it investigates the beamforming-aided caching problem in mmWave networks, and proposes a device-to-device assisted cooperative edge caching to alleviate backhaul congestion and reduce content retrieval delay. This book concludes with future research directions in the related fields of study. The presented beamforming designs and the corresponding research results covered in this book, provides valuable insights for practical mmWave network deployment and motivate new ideas for future mmWave networking. This book targets researchers working in the fields of mmWave networks, beamforming design, and resource management as well as graduate students studying the areas of electrical engineering, computing engineering and computer science. Professionals in industry who work in this field will find this book useful as a reference.
This book focuses on the current research on the dynamic spectrum sharing for efficient spectrum resource utilization, which covers the overlay spectrum sharing, underlay spectrum sharing and database-assisted spectrum sharing related research issues. Followed by a comprehensive review and in-depth discussion of the current state-of-the-art research literature and industry standardization, this book first presents a novel overlay spectrum sharing framework for dynamic utilization of available cellular frequency bands, formulates the dynamic spectrum sharing problem as a dynamic resource demand-supply matching problem, and accordingly develops a distributed fast spectrum sharing algorithm to solve the resource matching problem. A self-awareness power control approach for multi-hop routing selection is proposed, which can establish an effective and practical routing selection optimization in secondary access networks and minimize the interference to primary users. Finally, this book offers dynamic secondary access scheme for database-assisted spectrum sharing networks, which is targeted to support the prosperous wireless multimedia networking applications by leveraging the TV white spaces of geolocation databases while satisfying QoS guarantees of secondary users. The overlay spectrum sharing, underlay spectrum sharing, and database-assisted white spaces spectrum sharing research results that are presented in this book provide useful insights for the design of next generation wireless access networks. This book motivates a new line of thinking for efficient spectrum resource utilization and performance enhancements of future wireless access applications.
Parallel Algorithms for Optimal Control of Large Scale Linear Systems is a comprehensive presentation for both linear and bilinear systems. The parallel algorithms presented in this book are applicable to a wider class of practical systems than those served by traditional methods for large scale singularly perturbed and weakly coupled systems based on the power-series expansion methods. It is intended for scientists and advance graduate students in electrical engineering and computer science who deal with parallel algorithms and control systems, especially large scale systems. The material presented is both comprehensive and unique.
This book examines state-of-art research on designing healthcare applications with the consideration of security and privacy. It explains the Mobile Healthcare Network (MHN) architecture and its diverse applications, and reviews the existing works on security and privacy for MHNs. Critical future challenges and research problems are also identified. Using a Quality-of-Protection perspective, the authors provide valuable insights on security and privacy preservation for MHNs. Some promising solutions are proposed to accommodate the issues of secure health data transmission, misbehavior detection, health data processing with privacy preservation and access control in MHNs. Specifically, the secure health data aggregation explores social spots to help forward health data and enable users to select the optimal relay according to their social ties and health data priority. The secure aggregation achieves the desirable delivery ratio with reasonable communication costs and lower delay for the data in different priorities. A proposed misbehavior detection scheme distinguishes Sybil attackers from normal users by comparing their mobile contacts and pseudonym changing behaviors. The detection accuracy is high enough to resist various Sybil attacks including forgery. In addition, the health data processing scheme can analyze the encrypted health data and preserve user’s privacy at the same time. Attribute based access control can achieve fine-grained acces s control with user-defined access policy in MHNs. Security and Privacy for Mobile Healthcare Networks is designed for researchers and advanced-level students interested in healthcare security and secure data transmission.
This brief examines current research on improving Vehicular Networks (VANETs), examining spectrum scarcity due to the dramatic growth of mobile data traffic and the limited bandwidth of dedicated vehicular communication bands and the use of opportunistic spectrum bands to mitigate congestion. It reviews existing literature on the use of opportunistic spectrum bands for VANETs, including licensed and unlicensed spectrum bands and a variety of related technologies, such as cognitive radio, WiFi and device-to-device communications. Focused on analyzing spectrum characteristics, designing efficient spectrum exploitation schemes, and evaluating the date delivery performance when utilizing different opportunistic spectrum bands, the results presented in this brief provide valuable insights on improving the design and deployment of future VANETs.
This Springer Brief focuses on cognitive resource management in heterogeneous cellular networks (Het Net) with small cell deployment for the LTE-Advanced system. It introduces the Het Net features, presents practical approaches using cognitive radio technology in accommodating small cell data relay and optimizing resource allocation and examines the effectiveness of resource management among small cells given limited coordination bandwidth and wireless channel uncertainty. The authors introduce different network characteristics of small cell, investigate the mesh of small cell access points in parallel with macrocells in network control and resource management and address resource management in the backhaul with coordination constraints and wireless channel uncertainty. The final section of this brief summarizes and provides future research directions for this topic, including a proposed framework that has been evaluated through realistic simulations. Cognitive Resource Management for Heterogeneous Cellular Networks is designed for researchers and professionals working in wireless communications and networks. Advanced-level students studying electrical and computer engineering should also find the content helpful.
This book introduces the Internet access for vehicles as well as novel communication and computing paradigms based on the Internet of vehicles. To enable efficient and reliable Internet connection for mobile vehicle users, this book first introduces analytical modelling methods for the practical vehicle-to-roadside (V2R) Internet access procedure, and employ the interworking of V2R and vehicle-to-vehicle (V2V) to improve the network performance for a variety of automotive applications. In addition, the wireless link performance between a vehicle and an Internet access station is investigated, and a machine learning based algorithm is proposed to improve the link throughout by selecting an efficient modulation and coding scheme. This book also investigates the distributed machine learning algorithms over the Internet access of vehicles. A novel broadcasting scheme is designed to intelligently adjust the training users that are involved in the iteration rounds for an asynchronous federated learning scheme, which is shown to greatly improve the training efficiency. This book conducts the fully asynchronous machine learning evaluations among vehicle users that can utilize the opportunistic V2R communication to train machine learning models. Researchers and advanced-level students who focus on vehicular networks, industrial entities for internet of vehicles providers, government agencies target on transportation system and road management will find this book useful as reference. Network device manufacturers and network operators will also want to purchase this book.
This book introduces wireless traffic steering as a paradigm to realize green communication in multi-tier heterogeneous cellular networks. By matching network resources and dynamic mobile traffic demand, traffic steering helps to reduce on-grid power consumption with on-demand services provided. This book reviews existing solutions from the perspectives of energy consumption reduction and renewable energy harvesting. Specifically, it explains how traffic steering can improve energy efficiency through intelligent traffic-resource matching. Several promising traffic steering approaches for dynamic network planning and renewable energy demand-supply balancing are discussed. This book presents an energy-aware traffic steering method for networks with energy harvesting, which optimizes the traffic allocated to each cell based on the renewable energy status. Renewable energy demand-supply balancing is a key factor in energy dynamics, aimed at enhancing renewable energy sustainability to reduce on-grid energy consumption. Dynamic network planning adjusts cell density with traffic variations to provide on-demand service, which reduces network power consumption with quality of service provisioning during off-peak hours. With intra- or inter-tier traffic steering, cell density is dynamically optimized with regards to the instant traffic load for conventional homogeneous and multi-tier heterogeneous cellular networks, respectively. This book is beneficial for researchers and graduate students interested in traffic management and future wireless networking.
This SpringerBrief offers two concrete design examples for traffic offloading. The first is an optimal resource allocation for small-cell based traffic offloading that aims at minimizing mobile users’ data cost. The second is an optimal resource allocation for device-to-device assisted traffic offloading that also minimizes the total energy consumption and cellular link usage (while providing an overview of the challenging issues). Both examples illustrate the importance of proper resource allocation to the success of traffic offloading, show the consequent performance advantages of executing optimal resource allocation, and present the methodologies to achieve the corresponding optimal offloading solution for traffic offloading in heterogeneous cellular networks. The authors also include an overview of heterogeneous cellular networks and explain different traffic offloading paradigms ranging from uplink traffic offloading through small cells to downlink traffic offloading via mobile device-to-device cooperation. This brief is an excellent resource for postgraduate students studying advanced-level topics in wireless communications and networking. Researchers, engineers and professionals working in related fields will also find this brief a valuable resource tool.
This SpringerBrief presents key enabling technologies and state-of-the-art research on delivering efficient content distribution services to fast moving vehicles. It describes recent research developments and proposals towards the efficient, resilient and scalable content distribution to vehicles through both infrastructure-based and infrastructure-less vehicular networks. The authors focus on the rich multimedia services provided by vehicular environment content distribution including vehicular communications and media playback, giving passengers many infotainment applications. Common problems of vehicular network research are addressed, including network design and optimization, standardization, and the adaptive playout from a user’s perspective.
This Springer Brief covers emerging maritime wideband communication networks and how they facilitate applications such as maritime distress, urgency, safety and general communications. It provides valuable insight on the data transmission scheduling and protocol design for the maritime wideband network. This brief begins with an introduction to maritime wideband communication networks including the architecture, framework, operations and a comprehensive survey on current developments. The second part of the brief presents the resource allocation and scheduling for video packet transmission with a goal of maximizing the weights of uploaded video packets. Finally, an energy and content aware scheduling scheme is proposed for the most efficient vessel packet throughput. Based on the real ship route traces obtained from the navigation software BLM-Ship, simulation results demonstrate the viability of the proposed schemes. Conclusions and further research directions are discussed. Maritime Wideband Communication Networks: Video Transmission Scheduling is a valuable tool for researchers and professionals working in wireless communications and networks. Advanced-level students studying computer science and electrical engineering will also find the content valuable.
This brief presents a unified analytical framework for the evaluation of drive-thru Internet performance and accordingly proposes an optimal spatial access control management approach. A comprehensive overview and in-depth discussion of the research literature is included. It summarizes the main concepts and methods, and highlights future research directions. The brief also introduces a novel cooperative vehicular communication framework together with a delicate linear cluster formation scheme and low-delay content forwarding approach to provide a flexible and efficient vehicular content distribution in the drive-thru Internet. The presented medium access control and vehicular content distribution related research results in this brief provide useful insights for the design approach of Wi-Fi enabled vehicular communications and it motivates a new line of thinking for the performance enhancements of future vehicular networking. Advanced-level students, researchers and professionals interested in vehicular networks or coordinated network sharing will find Cooperative Vehicular Communications in the Drive-thru Internet a valuable reference.
This SpringerBrief provides the first systematic review of the existing works of cohesive subgraph search (CSS) over large heterogeneous information networks (HINs). It also covers the research breakthroughs of this area, including models, algorithms and comparison studies in recent years. This SpringerBrief offers a list of promising future research directions of performing CSS over large HINs. The authors first classify the existing works of CSS over HINs according to the classic cohesiveness metrics such as core, truss, clique, connectivity, density, etc., and then extensively review the specific models and their corresponding search solutions in each group. Note that since the bipartite network is a special case of HINs, all the models developed for general HINs can be directly applied to bipartite networks, but the models customized for bipartite networks may not be easily extended for other general HINs due to their restricted settings. The authors also analyze and compare these cohesive subgraph models (CSMs) and solutions systematically. Specifically, the authors compare different groups of CSMs and analyze both their similarities and differences, from multiple perspectives such as cohesiveness constraints, shared properties, and computational efficiency. Then, for the CSMs in each group, the authors further analyze and compare their model properties and high-level algorithm ideas. This SpringerBrief targets researchers, professors, engineers and graduate students, who are working in the areas of graph data management and graph mining. Undergraduate students who are majoring in computer science, databases, data and knowledge engineering, and data science will also want to read this SpringerBrief.
This book investigates intelligent network resource management for IoV, with the objective of maximizing the communication and computing performance of vehicle users. Focusing on two representative use cases in IoV, i.e., safety message broadcast and autonomous driving, the authors propose link-layer protocol design and application-layer computing task scheduling to achieve the objective given the unique characteristics and requirements of IoV. In particular, this book illustrates the challenges of resource management for IoV due to network dynamics, such as time-varying traffic intensity and vehicle mobility, and presents intelligent resource management solutions to adapt to the network dynamics. The Internet of Vehicles (IoV) enables vehicle-to-everything connectivity and supports a variety of applications for vehicles on the road. Intelligent resource management is critical for satisfying demanding communication and computing requirements on IoV, while the highly dynamic network environments pose challenges to the design of resource management schemes. This book provides insights into the significance of adaptive resource management in improving the performance of IoV. The customized communication protocol and computing scheduling scheme are designed accordingly by taking the network dynamics information as an integral design factor. Moreover, the decentralized designs of the proposed solutions guarantee low signaling overhead and high scalability. A comprehensive literature review summarizing recent resource management schemes in IoV, followed by the customized design of communication and computing solutions for the two IoV use cases is included which can serve as a useful reference for professionals from both academia and industry in the area of IoV and resource management. Researchers working within this field and computer science and electrical engineering students will find this book useful as well.
This SpringerBrief covers the security and privacy challenges in fog computing, and proposes a new secure and privacy-preserving mechanisms to resolve these challenges for securing fog-assisted IoT applications. Chapter 1 introduces the architecture of fog-assisted IoT applications and the security and privacy challenges in fog computing. Chapter 2 reviews several promising privacy-enhancing techniques and illustrates examples on how to leverage these techniques to enhance the privacy of users in fog computing. Specifically, the authors divide the existing privacy-enhancing techniques into three categories: identity-hidden techniques, location privacy protection and data privacy enhancing techniques. The research is of great importance since security and privacy problems faced by fog computing impede the healthy development of its enabled IoT applications. With the advanced privacy-enhancing techniques, the authors propose three secure and privacy-preserving protocols for fog computing applications, including smart parking navigation, mobile crowdsensing and smart grid. Chapter 3 introduces identity privacy leakage in smart parking navigation systems, and proposes a privacy-preserving smart parking navigation system to prevent identity privacy exposure and support efficient parking guidance retrieval through road-side units (fogs) with high retrieving probability and security guarantees. Chapter 4 presents the location privacy leakage, during task allocation in mobile crowdsensing, and propose a strong privacy-preserving task allocation scheme that enables location-based task allocation and reputation-based report selection without exposing knowledge about the location and reputation for participators in mobile crowdsensing. Chapter 5 introduces the data privacy leakage in smart grid, and proposes an efficient and privacy-preserving smart metering protocol to allow collectors (fogs) to achieve real-time measurement collection with privacy-enhanced data aggregation. Finally, conclusions and future research directions are given in Chapter 6. This brief validates the significant feature extension and efficiency improvement of IoT devices without sacrificing the security and privacy of users against dishonest fog nodes. It also provides valuable insights on the security and privacy protection for fog-enabled IoT applications. Researchers and professionals who carry out research on security and privacy in wireless communication will want to purchase this SpringerBrief. Also, advanced level students, whose main research area is mobile network security will also be interested in this SpringerBrief.
Learn how to provide seamless, high quality multimedia for the wireless Internet This book introduces the promising protocols for multimedia services and presents the analytical frameworks for measuring their performance in wireless networks. Furthermore, the book shows how to fine-tune the parameters for Quality of Service (QoS) provisioning in order to illustrate the effect that QoS has upon the stability, integrity and growth of next generation wireless Internet. In addition, the authors provide the tools required to implement this understanding. These tools are particularly useful for design and engineering network architecture and protocols for future wireless Internet. Additionally, the book provides a good overview of wireless networks, while also appealing to network researchers and engineers. Key Features: Provides a comprehensive and analytical understanding of the performance of multimedia services in wireless Internet, and the tools to implement such an understanding Addresses issues such as IEEE 802.11, AIMD/RED (Additive Increase-Multiplicative Decrease/ Random Early Detection), multimedia traffic models, congestion control and random access networks Investigates the impact of wireless characteristics on QoS constraint multimedia applications Includes a case study on AIMD for multimedia playback applications Features numerous examples, suggested reading and review questions for each chapter This book is an invaluable resource for postgraduate students undertaking courses in wireless networks and multimedia services, students studying advanced graduate courses in electrical engineering and computer science, and researchers and engineers in the field of wireless networks.
The field of information technology continues to advance at a brisk pace, including the use of Remote Laboratory (RL) systems in education and research. To address the needs of remote laboratory development for such purposes, the authors present a new state-of-the-art unified framework for RL system development. Included are solutions to commonly encountered RL implementation issues such as third-party plugin, traversing firewalls, cross platform running, and scalability, etc. Additionally, the book introduces a new application architecture of remote lab for mobile-optimized RL application development for Mobile Learning (M-Learning). It also shows how to design and organize the remote experiments at different universities and make available a framework source code. The book is intended to serve as a complete guide for remote lab system design and implementation for an audience comprised of researchers, practitioners and students to enable them to rapidly and flexibly implement RL systems for a range of fields.
This SpringerBrief focuses on the network capacity analysis of VANETs, a key topic as fundamental guidance on design and deployment of VANETs is very limited. Moreover, unique characteristics of VANETs impose distinguished challenges on such an investigation. This SpringerBrief first introduces capacity scaling laws for wireless networks and briefly reviews the prior arts in deriving the capacity of VANETs. It then studies the unicast capacity considering the socialized mobility model of VANETs. With vehicles communicating based on a two-hop relaying scheme, the unicast capacity bound is derived and can be applied to predict the throughput of real-world scenarios of VANETs. The downlink capacity of VANETs is also investigated in which access infrastructure is deployed to provide pervasive Internet access to vehicles. Different alternatives of wireless access infrastructure are considered. A lower bound of downlink capacity is derived for each type of access infrastructure. The last section of this book presents a case study based on a perfect city grid to examine the capacity-cost trade-offs of different deployments since the deployment costs of different access infrastructure are highly variable.
The book systematically introduces smart power system design and its infrastructure, platform and operating standards. It focuses on multi-objective optimization and illustrates where the intelligence of the system lies. With abundant project data, this book is a practical guideline for engineers and researchers in electrical engineering, as well as power network designers and managers in administration.
The field of information technology continues to advance at a brisk pace, including the use of Remote Laboratory (RL) systems in education and research. To address the needs of remote laboratory development for such purposes, the authors present a new state-of-the-art unified framework for RL system development. Included are solutions to commonly encountered RL implementation issues such as third-party plugin, traversing firewalls, cross platform running, and scalability, etc. Additionally, the book introduces a new application architecture of remote lab for mobile-optimized RL application development for Mobile Learning (M-Learning). It also shows how to design and organize the remote experiments at different universities and make available a framework source code. The book is intended to serve as a complete guide for remote lab system design and implementation for an audience comprised of researchers, practitioners and students to enable them to rapidly and flexibly implement RL systems for a range of fields.
This SpringerBrief evaluates the cooperative effort of sensor nodes to accomplish high-level tasks with sensing, data processing and communication. The metrics of network-wide convergence, unbiasedness, consistency and optimality are discussed through network topology, distributed estimation algorithms and consensus strategy. Systematic analysis reveals that proper deployment of sensor nodes and a small number of low-cost relays (without sensing function) can speed up the information fusion and thus improve the estimation capability of wireless sensor networks (WSNs). This brief also investigates the spatial distribution of sensor nodes and basic scalable estimation algorithms, the consensus-based estimation capability for a class of relay assisted sensor networks with asymmetric communication topology, and the problem of filter design for mobile target tracking over WSNs. From the system perspective, the network topology is closely related to the capability and efficiency of network-wide scalable distributed estimation. Wireless Sensor Networks: Distributed Consensus Estimation is a valuable resource for researchers and professionals working in wireless communications, networks and distributed computing. Advanced-level students studying computer science and electrical engineering will also find the content helpful.
This SpringerBrief offers a comprehensive review and in-depth discussion of the current research on resource management. The authors explain how to best utilize harvested energy and temporally available licensed spectrum. Throughout the brief, the primary focus is energy and spectrum harvesting sensor networks (ESHNs) including energy harvesting (EH)-powered spectrum sensing and dynamic spectrum access. To efficiently collect data through the available licensed spectrum, this brief examines the joint management of energy and spectrum. An EH-powered spectrum sensing and management scheme for Heterogeneous Spectrum Harvesting Sensor Networks (HSHSNs) is presented in this brief. The scheme dynamically schedules the data sensing and spectrum access of sensors in ESHSNs to optimize the network utility, while considering the stochastic nature of EH process, PU activities and channel conditions. This brief also provides useful insights for the practical resource management scheme design for ESHSNs and motivates a new line of thinking for future sensor networking. Professionals, researchers, and advanced-level students in electrical or computer engineering will find the content valuable.
The book systematically introduces smart power system design and its infrastructure, platform and operating standards. It focuses on multi-objective optimization and illustrates where the intelligence of the system lies. With abundant project data, this book is a practical guideline for engineers and researchers in electrical engineering, as well as power network designers and managers in administration.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.