3D P2P overlay over MANETs
We study the challenging problems of the mismatch between the overlay and the physical network and the resilience of the overlay structure in peer-to-peer (P2P) protocols over a mobile ad hoc network (MANET). Existing P2P protocols have used inflexible ...
Address-free contention in wireless access networks with common control channel for throughput improvement
In wireless local area network (WLAN) with common control channel (CCC), where the spectrum bandwidth is divided into two separate channels for access control and data transmission, concurrent transmissions of control and data frames can improve the ...
Reducing power consumption in backbone IP networks through table lookup bypass
We study the possibility of bypassing the table lookup capability of router linecards to save energy in IP networks. Differently from previous works, the table lookup operation is bypassed independently for each linecard. We first present a model for ...
Midgar: Generation of heterogeneous objects interconnecting applications. A Domain Specific Language proposal for Internet of Things scenarios
- Cristian González García,
- B. Cristina Pelayo G-Bustelo,
- Jordán Pascual Espada,
- Guillermo Cueva-Fernandez
Smart Objects and Internet of Things are two ideas that describe the future. The interconnection of objects can make them intelligent or expand their intelligence. This is achieved by a network that connects all the objects in the world. A network where ...
Enhancing secure access to sensor data with user privacy support
With the development of solutions like 6LoWPAN, the implementation of IP technology in sensor devices is already a reality. Therefore, sensors can be natively integrated in the Internet, becoming globally addressable by any other Internet-connected ...
Subcarrier and power allocation for OFDMA-based multicast cellular networks using a coalitional game
The subcarrier and power allocation problem for orthogonal frequency-division multiple access (OFDMA)-based multicast cellular networks is investigated in this paper. Due to the intrinsic heterogeneity of the channel gains experienced by different ...
An adaptive elliptical anomaly detection model for wireless sensor networks
Wireless Sensor Networks (WSNs) provide a low cost option for monitoring different environments such as farms, forests and water and electricity networks. However, the restricted energy resources of the network impede the collection of raw monitoring ...
DNStamp: Short-lived trusted timestamping
Trusted timestamping consists in proving that certain data existed at a particular point in time. Existing timestamping methods require either a centralized and dedicated trusted service or the collaboration of other participants using the timestamping ...
An intelligent path recommendation protocol (ICOD) for VANETs
This work introduces a novel, intelligent, real-time, distributed, and flexible path recommendation protocol. We refer to the introduced protocol as an Intelligent path recommendation protocol (ICOD). This protocol aims to find the best path towards ...
Self-tuned distributed monitoring of multi-channel wireless networks using Gibbs sampler
Wireless side monitoring employing distributed sniffers has been shown to complement wired side monitoring using Simple Network Management Protocol (SNMP) and base station logs, since it reveals detailed PHY and MAC behaviors, as well as timing ...
Lightweight collaborative key establishment scheme for the Internet of Things
This work addresses new security issues in the Internet of Things (IoT). The heterogeneous nature of IoT communications and imbalance in resource capabilities between IoT entities make it challenging to provide the required end-to-end secured ...
Estimating human trajectories and hotspots through mobile phone data
Nowadays, the huge worldwide mobile-phone penetration is increasingly turning the mobile network into a gigantic ubiquitous sensing platform, enabling large-scale analysis and applications. Recently, mobile data-based research reached important ...
Adaptive congestion control framework and a simple implementation on high bandwidth-delay product networks
As new link technologies and sub-networks proliferate and evolve, a large number of TCP variants have been developed for different types of the network environments. They can lead to major performance gains by taking advantage of local characteristics ...
Tracking freeriders in gossip-based content dissemination systems
Gossip-based protocols have proven very efficient for disseminating high-bandwidth content such as video streams in a peer-to-peer fashion. However, for the protocols to work, nodes are required to collaborate by devoting a fraction of their upload ...
Design and analysis of a frame-oriented dynamic bandwidth allocation scheme for triple-play services over EPONs
Ethernet Passive Optical Networks (EPONs) are regarded as an important technology for current access networks. However, EPONs perform poorly in differentiated service environments, and may therefore fail to meet the Quality of Service (QoS) demands of ...
Enhancing wireless networks with caching: Asymptotic laws, sustainability & trade-offs
We investigate on the sustainability of multihop wireless communications in the context of Information-Centric Networks, when content is replicated in caches over the network. The problem is cast in a flat wireless network for a given content popularity ...
CommonFinder: A decentralized and privacy-preserving common-friend measurement method for the distributed online social networks
Distributed social networks have been proposed as alternatives for offering scalable and privacy-preserving online social communication. Recommending friends in the distributed social networks is an important topic. We propose CommonFinder, a ...
Review Article: Lifetime and availability of data stored on a P2P system: Evaluation of redundancy and recovery schemes
This paper studies the performance of Peer-to-Peer storage and backup systems (P2PSS). These systems are based on three pillars: data fragmentation and dissemination among the peers, redundancy mechanisms to cope with peers churn and repair mechanisms ...