The continuous traffic increase of mobile communication systems has the collateral effect of higher energy consumption, affecting battery lifetime in the user equipment (UE). An effective solution ...for energy saving is to implement a discontinuous reception (DRX) mode. However, guaranteeing a desired quality of experience (QoE) while simultaneously saving energy is a challenge; but undoubtedly both energy efficiency and the QoE have been essential aspects for the provision of real‐time services, such as voice over Internet protocol (VoIP), voice over LTE, and mobile broadband in 4G networks and beyond. This paper focuses on human voice communications and proposes a Gaussian process regression algorithm that is capable of recognizing patterns of silence and predicts its duration in human conversations, with a prediction error as low as 1.87%. The proposed machine learning mechanism saves energy by switching OFF/ON the radio frequency interface, in order to extend the UE autonomy without harming QoE. Simulation results validate the effectiveness of the proposed mechanism compared with the related literature, showing improvements in energy savings of more than 30% while ensuring a desired QoE level with low computational cost.
Summary
Novel methods to approximate the probability density function of the product, ratio, and sum of α‐μ random variables are presented in this article. The approximations are simple to compute ...and produce results that range from fairly accurate to perfectly accurate, depending on the parameters of the involved α‐μ distributions. In addition, as an application of the results, it is investigated the performance of a cooperative cognitive network in which the secondary source and the relays are energy‐constrained nodes and harvest their energy from the primary network.
Novel methods to approximate the probability density function of the product, ratio, and sum of α‐μ random variables are presented in this article. The approximations are simple to compute and produce results that range from fairly accurate to perfectly accurate. In addition, as an application of the results, it is investigated the performance of a cooperative cognitive network in which the secondary source and the relays are energy‐constrained nodes and harvest their energy from the primary network.
The rapid development of the Internet of Things (IoT) has brought about the processing and storage of sensitive information on resource-constrained devices, which are susceptible to various hardware ...attacks. Fault injection attacks (FIAs) stand out as one of the most widespread. Particularly, voltage-based FIAs (V-FIAs) have gained popularity due to their non-invasive nature and high effectiveness in inducing faults by pushing the IoT hardware to its operational limits. Improving the security of devices and gaining a comprehensive understanding of their vulnerabilities is of utmost importance. In this study, we present a novel fault injection method and employ it to target an 8-bit AVR microcontroller. We identify the optimal attack parameters by analyzing the detected failures and their trends. A case study is conducted to validate the efficacy of this new method in a more realistic scenario, focusing on a simple authentication method using the determined optimal parameters. This analysis not only demonstrates the feasibility of the V-FIA but also elucidates the primary characteristics of the resulting failures and their propagation in resource-constrained devices. Additionally, we devise a hardware/software countermeasure that can be integrated into any resource-constrained device to thwart such attacks in IoT scenarios.
Summary
In this paper, we propose two schemes based on a full‐duplex network‐coded cooperative communication (FD‐NCC) strategy, namely, full‐duplex dynamic network coding (FD‐DNC) and full‐duplex ...generalized dynamic network coding (FD‐GDNC). The use of full‐duplex communication aims at improving the spectrum efficiency of a two‐user network where the users cooperatively transmit their independent information to a common destination. In the proposed FD‐NCC schemes, the self‐interference imposed by full‐duplexing is modeled as a fading channel, whose harmful effect can be partially mitigated by interference cancellation techniques. Nevertheless, our results show that, even in the presence of self‐interference, the proposed FD‐NCC schemes can outperform (in terms of outage probability) the equivalent half‐duplex network‐coded cooperative (HD‐NCC) schemes, as well as traditional cooperation techniques. Moreover, the ϵ‐outage capacity, that is, the maximum information rate achieved by the users given a target outage probability, is evaluated. Finally, we examine the use of multiple antennas at the destination node, which increases the advantage of the FD‐NCC (in terms of the diversity‐multiplexing trade‐off and ϵ‐outage capacity).
In this paper, we propose two schemes based on a full‐duplex network‐coded cooperative communication (FD‐NCC) strategy, namely, full‐duplex dynamic network coding (FD‐DNC) and full‐duplex generalized dynamic network coding (FD‐GDNC), for a scenario with multiple antennas at the destination node. We evaluate the proposed schemes in terms of outage probability, diversity‐multiplexing trade‐off, and ϵ‐outage capacity. Even in the presence of self‐interference, the proposed FD‐NCC schemes can outperform the equivalent half‐duplex network‐coded cooperative (HD‐NCC) schemes, as well as traditional cooperation techniques.
Wireless energy transfer (WET) is emerging as a potential solution for powering small energy-efficient devices. We propose strategies that use multiple antennas at a power station, which wirelessly ...charges a large set of single-antenna devices. The proposed strategies operate without channel state information (CSI), and we attain the distribution and main statistics of the harvested energy under Rician fading channels with sensitivity and saturation energy-harvesting (EH) impairments. A switching antenna strategy, where a single antenna with full power transmits at a time, provides the most predictable energy source, and it is particularly suitable for powering sensor nodes with highly sensitive EH hardware operating under non-LOS (NLOS) conditions while other WET schemes perform alike or better in terms of the average harvested energy. While switching antennas is the best under NLOS, transmitting simultaneously with equal power in all antennas is the most beneficial as LOS increases. Moreover, spatial correlation is not beneficial unless the power station transmits simultaneously through all antennas, raising a tradeoff between average and variance of the harvested energy since both metrics increase with the spatial correlation. Moreover, the performance gap between CSI-free and CSI-based strategies decreases quickly as the number of devices increases.
The Internet of Things (IoT) is a key technology to interconnect the real and digital worlds, enabling the development of smart cities and services. The timely collection of data is essential for IoT ...services. In scenarios such as agriculture, industry, transportation, public safety, and health, wireless sensor networks (WSNs) play a fundamental role in fulfilling this task. However, WSNs are commonly deployed in sensitive and remote environments, thus facing the challenge of jamming attacks. Therefore, these networks need to have the ability to detect such attacks and adopt countermeasures to guarantee connectivity and operation. In this work, we propose a novel clustering-based self-healing strategy to overcome jamming attacks, in which we denominate fairness cooperation with power allocation (FCPA). The proposed strategy, aware of the presence of the jammer, clusters the network and designates a cluster head that acts as a sink node to collect information from its cluster. Then, the most convenient routes to overcome the jamming are identified and the transmit power is adjusted to the minimum value required to guarantee the reliability of each link. Finally, through the weighted use of the relays, the lifetime of each subnetwork is extended. To show the impact of each capability of FCPA, we compare it with multiple benchmarks that only partially possess these capabilities. In the proposal evaluation, we consider a WSN composed of 64 static nodes distributed in a square area. Meanwhile, to assess the impact of the jamming attack, we consider seven different locations of the attacker. All experiments started with each node's battery full and stopped after one of these batteries was depleted. In these scenarios, FCPA outperforms all other strategies by more than 50% of the information transmitted, due to the efficient use of relay power, through the weighted balance of cooperative routes. On average, FCPA permits 967,961 kb of information transmitted and 63% of residual energy, as energy efficiency, from all the analyzed scenarios. Additionally, the proposed clustering-based self-healing strategy adapts to the change of jammer location, outperforming the rest of the strategies in terms of information transmitted and energy efficiency in all evaluated scenarios.
The expectation for communication systems beyond 5G/6G is to provide high reliability, high throughput, low latency, and high energy efficiency services. The integration between systems based on ...radio frequency (RF) and visible light communication (VLC) promises the design of hybrid systems capable of addressing and largely satisfying these requirements. Hybrid network design enables complementary cooperation without interference between the two technologies, thereby increasing the overall system data rate, improving load balancing, and reducing non-coverage areas. VLC/RF hybrid networks can offer reliable and efficient communication solutions for Internet of Things (IoT) applications such as smart lighting, location-based services, home automation, smart healthcare, and industrial IoT. Therefore, hybrid VLC/RF networks are key technologies for next-generation communication systems. In this paper, a comprehensive state-of-the-art study of hybrid VLC/RF networks is carried out, divided into four areas. First, indoor scenarios are studied considering lighting requirements, hybrid channel models, load balancing, resource allocation, and hybrid network topologies. Second, the characteristics and implementation of these hybrid networks in outdoor scenarios with adverse conditions are analyzed. Third, we address the main applications of hybrid VLC/RF networks in technological, economic, and socio-environmental domains. Finally, we outline the main challenges and future research lines of hybrid VLC/RF networks.
Direct-to-satellite Internet of Things (IoT) solutions have attracted a lot of attention from industry and academia recently, as promising alternatives for large scale coverage of a massive number of ...IoT devices. In this work, we considered that a cluster of IoT devices was under the coverage of a constellation of low-Earth orbit (LEO) satellites, while slotted Aloha was used as a medium access control technique. Then, we analyzed the throughput and packet loss rate while considering potentially different erasure probabilities at each of the visible satellites within the constellation. We show that different combinations of erasure probabilities at the LEO satellites and the IoT traffic load can lead to considerable differences in the system’s performance. Next, we introduce an intelligent traffic load distribution (ITLD) strategy, which, by choosing between a non-uniform allocation and the uniform traffic load distribution, guarantees a high overall system throughput, by allocating more appropriate amounts of traffic load at different positions (i.e., different sets of erasure probabilities) of the LEO constellation with respect to the IoT cluster. Finally, the results show that ITLD, a mechanism with low implementation complexity, allows the system to be much more scalable, intelligently exploiting the potential of the different positions of the satellite constellation.
The design of cooperative advanced driver assistance systems (C-ADAS) involves a holistic and systemic vision that considers the bidirectional interaction among three main elements: the driver, the ...vehicle, and the surrounding environment. The evolution of these systems reflects this need. In this work, we present a survey of C-ADAS and describe a conceptual architecture that includes the driver, vehicle, and environment and their bidirectional interactions. We address the remote operation of this C-ADAS based on the Internet of vehicles (IoV) paradigm, as well as the involved enabling technologies. We describe the state of the art and the research challenges present in the development of C-ADAS. Finally, to quantify the performance of C-ADAS, we describe the principal evaluation mechanisms and performance metrics employed in these systems.