International Journal of Autonomous and Adaptive Communications Systems (10 papers in press)
Design and implementation of A CATV Network Management System based on a General-Purpose Agent
by Wenbo Zhang, Nan Bai, Guangjie Han, Yongxin Feng
Abstract: Many cable television (CATV) devices, which cannot be feasibly monitored using a simple network management protocol, are used in CATV networks. It is difficult to remotely monitor these devices online because different protocols are used in different devices. In this paper, we design and implement a general-purpose network management agent that can communicate efficiently with different devices. Furthermore, data obtained from devices can be transmitted effectively to users. The simulation results show that this general-purpose agent can effectively respond to user requests, such as configuration requests and search requests. Moreover, the agent can maintain steady, stable device performance parameters while supporting concurrent multi-user operation.
Keywords: CATV Network; Network Management Agent; General-purpose Agent.
Design of an Autonomic Communication System
by Jose Aguilar, Kristell Aguilar, José Torres
Abstract: In modern communication systems, it is necessary to develop new approaches to optimize them. To achieve this objective, new paradigms are necessary. The present work proposes the conception of an autonomic communication system, which is based on a Bayesian network and on an ontology, to take reconfiguration decisions in the system. The ontology provides the knowledge about the performance factors and their relationships in the communication networks, to configure the structure of the Bayesian network. The Bayesian network is the stochastic reasoning mechanism used by the decision-making system. We present several tests on the NS2 simulator, and we observe an improvement in the system performance, for scenarios with high reconfiguration requirements.
Keywords: autonomic communication system; autonomous systems; Bayesian network; ontology.
Performance of $L$-SC Receiver over Generalized $K$-fading Channels
by Pampee Das, Rupaban Subadar
Abstract: Fading is a phenomenon which is highly degrading the quality of the
wireless signal. Shadowing is also an event due to which the receive quality of the
signal degrades considerably even if the receiver is closed to the transmitter. Both
this phenomena is happening together in a wireless environment. However, very
little work has carried out to analyze the joint effect of these two phenomena. The
KG fading model describes accurately composite multipath/shadowing fading
channels and the analytical results are highly matching with the experimentally
obtained results due to more accurate statistical modeling of the channels.
Analysis of selection combining (SC) diversity receiver has been presented in
this paper considering an arbitrary number of diversity branches. The receiver
performance have been studied based on the numerical evaluation of the obtained
expressions of average bit error rate and ergodic capacity. The presented analysis
will assist the design people to optimize their system in an environment where
both fading and shadowing effect is prominent.
Keywords: Fading/Shadowing channels; $K_G$ fading channels; SC receiver; ABER; Channel capacity.
Computing modes-based task processing for Industrial Internet of Things
by Juan Wang, Di Li
Abstract: The Industrial Internet of Things (IIoT) is facing enormous challenges, including limited computing resources and network bandwidth and high energy consumption. To facilitate the realization of IIoT-enabled manufacturing, several problems concerning computing modes and interaction patterns among fog nodes and the cloud should be clarified: what the typical computing modes are; what their advantages and drawbacks are; and how the tasks are calculated in different computing modes. The above-listed problems are the focus of this paper. Four computing modes are listed accordingly, namely, local computing, remote computing, cloud computing and fog computing. The system model is established for each kind of computing mode, and the models for delay and energy consumption are formulated. A task processing experiment platform is set up in simulation software. The experimental results show that compared with other computing modes, fog computing exhibits better performance in terms of delay and energy consumption.
Keywords: Industrial Internet of Things (IIoT); task processing; cloud computing; fog computing.
Research and Realization of Realtime Ethernet Protocol for Networked Motion Control System
by Shouting Feng, Zhongshuo Zhuo, Daru Pan
Abstract: In PC-based motion control system, networking is the trend. Since the
host is running a non-real-time operating system, the existing real-time Ethernet
protocol cannot be implemented directly on the host. Existing control cards
typically use non-real-time Ethernet protocols, such as TCP/IP, making it difficult
to achieve multi-axis synchronization between control cards. A practical scheme
is proposed in this paper to solve this problem. In this scheme, the internal clocks
of control cards are adjusted to the same value by the sync frames periodically
sent by the host, so that in effect all axes seem to be driven by the same clock. The
jitter of the sync frame has very little impact on the consistency of the clocks of all
control cards. This alleviates the real-time performance requirements of the host,
and thus reduces the cost and design difficulty. In addition, all synchronous or
asynchronous frames are unified into a cluster frame model, which simplifies the
processing of the frames to fly-read or fly-write, making it easy to implement in
hardware such as FPGAs. This real-time Ethernet protocol has been implemented
in a large-scale motion control chip. And the test results showed that this scheme
achieves expected performance, and the shorter the period of the sync frames, the
higher the accuracy of synchronization motion control.
Keywords: Real-Time; Ethernet; protocol; synchronization; Motion Control;
A Novel Zero Knowledge Proof of Retrievability
by Dexin Yang, Liming Liu
Abstract: Proof of retrievability is a cryptographic tool which interacts between the data user and the server,and the server proves to the data user the integrity of data which he will download.It is a crucial problem in outsourcing storage such as cloud computing. In this paper,a novel scheme called the zero knowledge proof of retrievability is proposed,which combines proof of retrievability and zero knowledge proof.It has lower computation and communication complexity and higher security than the previous schemes.
Keywords: Outsourced Storage;Zero Knowledge Proof;Proof of Retrievability;Cloud Computing.
SDN Replaced Deployment and Real-Time QoS Provisioning Based on Network Models
by Junhua Zhang
Abstract: From industrial communications to real-time internet applications, end-to-end delay guarantee is one of the most important aspects of quality of service (QoS). As a new networking paradigm, software-defined networking (SDN) exposes an opportunity to provide this guarantee. In exploiting SDN, We can replace the legacy network devices to SDN Forwarding Units (SDN-FUs) gradually. This paper focuses on the SDN replaced deployment problem, striving for providing real-time QoS provisioning in a network meanwhile. Utilizing previous works originated from network calculus, we first propose the candidate nodes selection methods for upgrading legacy nodes to SDN-FUs, and then present a routing algorithm located on SDN Controller to direct the running of SDN-FUs. Via a simulation about a small network, we show that the delay of a flow passing through a network can reduce significantly with the usage of SDN.
Keywords: quality of service (QoS); software-defined networking (SDN); network models; network calculus; real-time.
Fault-Resilient and QoS Centric Dynamic Network Sensitive Routing Protocol for Mobile-WSNs
by GANESH DR, KIRAN KUMARI PATIL, SURESH L
Abstract: The exponential rise in the demand of wireless communication has revitalized academia-industry to achieve more efficient networking solution. To meet these demands Wireless Sensor Networks (WSNs) have always been the dominating solution, however static node and network characteristics confine its suitability for applications under dynamic topology. Strengthening WSN with fault-resilient route decision by exploiting dynamic network parameters such as current congestion probability, buffer availability, and packet injection rate can ensure reliable and Quality of Service (QoS) communication over WSNs under dynamic network topology. With this motivation, in this paper multiple network parameters based Fault-resilient and QoS centric Dynamic Network Sensitive Routing Protocol (FQ-DNSRP) is developed. FQ-DNSRP exploits network parameters at the different layers of the IEEE 802.15.4 protocol stack, i.e., Application Layer, Network Layer, MAC Layer, and PHY Layer to derive a Node Rank Matrix that helps in identifying best forwarding node for deadline sensitive and reliable data transmission. Some of the key novelties are service differentiation based data prioritization and resource allocation, pro-active node management, congestion awareness, dynamic link quality estimation, packet injection ratio estimation, deadline sensitive data prioritization, and physical switching that cumulatively ensures fault-resilient and QoS delivery over WSN. Simulation results revealed that the proposed FQ-DNSRP model exhibits satisfactory performance for real time data delivery over mobile-WSNs that can be significant for numerous applications, including IoT ecosystems.
Keywords: Mobile-Wireless Sensor Network; Fault-resilient routing; Quality of Service; Network Aware Routing Protocol; Mission Critical Communication.
Adaptive embedded systems: a systematic review
by Fateh Boutekkouk
Abstract: Adaptive Embedded Systems (AES) are embedded systems whose behavior and architecture are adjusted in run time to fulfill changing requirements. Despite the huge effort furnished by researchers to develop design methodologies and their associated tools for AES, we can easily observe that none of the existing approaches provides a complete development process covering all development phases and supporting traceability between their produced artifacts. Furthermore, most existing tools are not interoperable. Thus, a standard or at least a domain-specific methodology will be needed for an effective cost/delay design of AES. In this paper, we review AES modeling techniques and design methodologies. At the end of the paper, we will illustrate the main challenges confronted by AES design and some future perspectives.
Keywords: Adaptive embedded systems; control theory; bio-inspired approaches; agent; Model-based design.
SAMA: A Secure and Anonymous Mutual Authentication With Conditional Identity-Tracking Scheme in a Unified Car Sharing System
by Oladayo Olakanmi
Abstract: Development of an efficient anonymous authentication scheme for an effective car sharing system is not new, however, to developrna single key based authentication scheme for interservice in a unified cars sharing is a challenging issue. Although some existingrnschemes are capable of providing secure authentication in vehicular ad hoc network but majority of them are network-specific orrnprovider-specific with high computational latency incurred from their signatures and certificates verification processes. Apart fromrnthis, some of them could not guarantee confidentiality and integrity through a single private key, thus creating overheads throughrndifferent keys generation and storage.rnIn this paper, an effective anonymous authentication scheme, which is capable of detecting and preventing malicious entity fromrndisrupting the operations of the car sharing system is proposed. The scheme also provides a conditional identity-tracing approachrnto track and expose a malicious entity by revoking the privacy of the misbehaving entity. The scheme allows interoperations amongrnthe different car sharing service providers by allowing registered users of any provider to share cars of other providers aside fromrnthe one registered with. This enriches service provision for users.rnThe scheme is implemented and analysed, the experimental and analysis results show that our scheme is not only secure but alsornwith low computational latency.
Keywords: Taxi-call System; Car sharing; Autonomous Vehicle; authentication; privacy preservation.