Emerging Wireless Communication and Network Technologies -

Emerging Wireless Communication and Network Technologies (eBook)

Principle, Paradigm and Performance
eBook Download: PDF
2018 | 1st ed. 2018
IX, 360 Seiten
Springer Singapore (Verlag)
978-981-13-0396-8 (ISBN)
Systemvoraussetzungen
117,69 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

The book covers a wide range of wireless communication and network technologies, and will help readers understand the role of wireless technologies in applications touching on various spheres of human life, e.g. healthcare, agriculture, building smart cities, forecasting and the manufacturing industry.

The book begins by discussing advances in wireless communication, including emerging trends and research directions for network technologies. It also highlights the importance of and need to actively develop these technologies.

In turn, the book addresses different algorithms and methodologies which could be beneficial in implementing 5G Mobile Communication, Vehicular Ad-hoc Networks (VANET), Reliable Cooperative Networks, Delay Tolerant Networks (DTN) and many more contexts related to advanced communications. It then addresses the prominence of wireless communication in connection with the Internet of Things (IoT), Mobile Opportunistic Networks and Cognitive Radio Networks (CRN). Lastly, it presents the new horizons in architecture and building protocols for Li-Fi (Light-Fidelity) and Wearable Sensor Technology.



Prof. Karm Veer Arya received his PhD from the Indian Institute of Technology in Kanpur (IITK), India and his Master's degree from the Indian Institute of Science (IISc) in Bangalore, India. His research areas include Image Processing, Biometrics, Information Security, and Wireless Ad-hoc Networks. He is currently working as a Professor at the Institute of Engineering & Technology (IET), Lucknow, and as Dean of PG Studies and Research, AKTU Lucknow, Uttar Pradesh, India. He has published more than 150 papers in international journals and conferences and supervised 6 Ph.D. scholars and more than 100 Master's students. In addition, he has completed several funded research projects.

Robin Singh Bhadoria has worked in various fields, including Data Mining, Cloud Computing, Service Oriented Architectures, Wireless Sensor Networks, etc. He has published more than 60 research articles in the form of book chapters, conference and journal papers, and has released three edited books. Most recently, he completed his Ph.D. in the discipline of Computer Science & Engineering at the Indian Institute of Technology Indore (IITI), Madhya Pradesh, India.

Prof Narendra S. Chaudhari has more than 35 years of academic and research experience.  He was Professor of Computer Science in the Ministry of Defense (Govt. of India) M.Sc. DRDO Program from 1990 to 2001 and has been Professor of Computer Science and Engineering at the Indian Institute of Technology (IIT) Indore since 2009.   He has also been a member of the Computer Engineering faculty at Nanyang Technological University (NTU), Singapore since 2002 to 2009. He has also been the Director of Visvesvaraya National Institute of Technology (VNIT), Nagpur, Maharashtra State, India since 2013.  His research contributions are in the areas of algorithms and graph theory, network security and mobile computing, novel neural network models, context free grammar parsing, and optimization. He has authored more than three hundred forty research publications.


The book covers a wide range of wireless communication and network technologies, and will help readers understand the role of wireless technologies in applications touching on various spheres of human life, e.g. healthcare, agriculture, building smart cities, forecasting and the manufacturing industry.The book begins by discussing advances in wireless communication, including emerging trends and research directions for network technologies. It also highlights the importance of and need to actively develop these technologies. In turn, the book addresses different algorithms and methodologies which could be beneficial in implementing 5G Mobile Communication, Vehicular Ad-hoc Networks (VANET), Reliable Cooperative Networks, Delay Tolerant Networks (DTN) and many more contexts related to advanced communications. It then addresses the prominence of wireless communication in connection with the Internet of Things (IoT), Mobile Opportunistic Networks and Cognitive Radio Networks (CRN). Lastly, it presents the new horizons in architecture and building protocols for Li-Fi (Light-Fidelity) and Wearable Sensor Technology.

Prof. Karm Veer Arya received his PhD from the Indian Institute of Technology in Kanpur (IITK), India and his Master’s degree from the Indian Institute of Science (IISc) in Bangalore, India. His research areas include Image Processing, Biometrics, Information Security, and Wireless Ad-hoc Networks. He is currently working as a Professor at the Institute of Engineering & Technology (IET), Lucknow, and as Dean of PG Studies and Research, AKTU Lucknow, Uttar Pradesh, India. He has published more than 150 papers in international journals and conferences and supervised 6 Ph.D. scholars and more than 100 Master’s students. In addition, he has completed several funded research projects.Robin Singh Bhadoria has worked in various fields, including Data Mining, Cloud Computing, Service Oriented Architectures, Wireless Sensor Networks, etc. He has published more than 60 research articles in the form of book chapters, conference and journal papers, and has released three edited books. Most recently, he completed his Ph.D. in the discipline of Computer Science & Engineering at the Indian Institute of Technology Indore (IITI), Madhya Pradesh, India. Prof Narendra S. Chaudhari has more than 35 years of academic and research experience.  He was Professor of Computer Science in the Ministry of Defense (Govt. of India) M.Sc. DRDO Program from 1990 to 2001 and has been Professor of Computer Science and Engineering at the Indian Institute of Technology (IIT) Indore since 2009.   He has also been a member of the Computer Engineering faculty at Nanyang Technological University (NTU), Singapore since 2002 to 2009. He has also been the Director of Visvesvaraya National Institute of Technology (VNIT), Nagpur, Maharashtra State, India since 2013.  His research contributions are in the areas of algorithms and graph theory, network security and mobile computing, novel neural network models, context free grammar parsing, and optimization. He has authored more than three hundred forty research publications.

Preface 5
Contents 7
About the Editors 9
Wireless Technology and Communications—Explorations & Trends
Advancement in Wireless Technologies and Networks 11
1 Introduction 11
1.1 Need for Advancement in Wireless Technologies 12
2 Emerging Trends and Research Direction for Wireless Technologies 13
2.1 Advancement in Technology Along with Existing Works 16
3 Results and Discussion 16
4 Conclusion 17
References 18
Cognitive Radio Network Technologies and Applications 20
1 Introduction 20
2 Network Architecture of Cognitive Radio Networks 21
3 Spectrum Sensing 22
3.1 Noncooperative Sensing 23
3.2 Cooperative Sensing 27
3.3 Interference-Based Sensing 28
3.4 Predicting Channel to Sense 28
4 Spectrum Decision 29
5 Spectrum Sharing 31
5.1 Spectrum Allocation in Centralized Interweave Cognitive Radio Network 32
6 Spectrum Mobility 33
7 Security Issues in Cognitive Radio Networks 35
8 Applications of Cognitive Radio Networks in LTE and Wi-Fi 36
8.1 LTE and Wi-Fi Coexistence 37
8.2 Wi-Fi and DSRC Coexistence 40
9 Conclusion 40
References 41
Emerging Trends in Vehicular Communication Networks 44
1 Introduction: Vehicular Communication Networks 44
2 Requirements for Next-Generation Vehicular Communication Networks 46
3 Enabling Radio Technologies for Next-Generation Vehicular Networks 48
3.1 Dedicated Short-Range Communications (DSRC) 48
3.2 Long-Term Evolution (LTE) Cellular 48
3.3 Wi-Fi 49
3.4 Millimeter Wave Bands 49
3.5 Visible Light Bands 50
3.6 Satellite Communication 50
3.7 Low-Power Wide Area Networks (LPWANs) 50
4 Next-Generation Vehicular Architecture 51
4.1 Medium Access Control (MAC) Protocol Design 51
4.2 Network and Routing Protocol Design 52
4.3 Transport Protocol Design 54
5 Knowledge Acquisition and Distribution in Vehicular Communication Networks 55
5.1 Knowledge Acquisition 56
5.2 How to Measure the Utility of Data 58
5.3 Knowledge Distribution 59
6 Emerging Protocols for Privacy Management and Secure Data Access Control in Vehicular Networks 60
6.1 Security Concerns in Vehicular Networks 60
6.2 Emerging Protection Mechanisms for Vehicular Networks 61
7 Conclusions 62
References 63
An Overview of 5G Technologies 65
1 Introduction 65
2 Evolution of Mobile Technologies from 1G to 5G 66
3 5G Trends, Targets, Requirements, and Challenges 67
3.1 5G Trends 69
3.2 5G Targets 70
3.3 5G Requirements 71
3.4 5G Challenges 71
4 5G Enabling Technologies 72
4.1 Massive MIMO 73
4.2 mmWave Massive MIMO 74
4.3 Cloud Radio Access Networks 75
4.4 D2D Communications 75
4.5 Ultradense Heterogeneous Networks 77
5 Conclusions 82
References 83
Design and Application for Reliable Cooperative Networks 87
1 Relaying Protocol for Collaborative Transmission in Cooperative Networks 88
1.1 The Fundamental of Relay Protocols 88
1.2 Calculation of End-to-End Signal-to-Noise Ratio (SNR) for Relaying Networks and System Performance Evaluation 91
1.3 Considerations on DF Scheme in Relaying Networks 91
2 Simultaneous Wireless Information and Power Transfer-Aware Relay 92
2.1 Policies for Wireless Power Transfer 92
2.2 Energy Harvesting in Relaying Network 93
2.3 Investigation on Energy Harvesting System Performance 96
3 Full-Duplex Cooperative Networks 96
3.1 An Architecture of Full-Duplex Energy Harvesting Network 97
3.2 Full-Duplex System Analysis 98
3.3 System Performance Analysis 100
4 Secure Communication Between Source and Destination via Untrusted Node 100
4.1 Secure Relaying Communication Model 101
4.2 Maximum Energy Harvesting (MEH) Protocol 101
5 MIMO Relaying Model and Challenges in Relaying Design 103
5.1 Wireless Powered Communication with Multi-antenna System 103
5.2 Challenges in Design of Cooperative Networks 105
6 Conclusion 105
References 106
Semantics for Delay-Tolerant Network (DTN) 107
1 Introduction 107
1.1 Significance of DTN 108
1.2 Features of DTN 109
1.3 Applications of DTN 109
2 DTN Architecture 111
2.1 System Architecture 111
2.2 Layer Architecture 113
3 Transmission in Delay-Tolerant Network 114
3.1 Contacts 114
3.2 Bundle Protocol 115
3.3 Custody Transfer 117
3.4 Flow and Congestion Control 117
3.5 Message Switching 118
4 Routing in Delay-Tolerant Network 119
4.1 Unicast Routing 119
4.2 Multicast Routing 119
4.3 Anycast Routing 122
4.4 Buffer Management 123
4.5 Performance Metrics 123
5 Security in Delay-Tolerant Network 124
5.1 Security Issues 125
5.2 Fragments Authentication 125
6 Delay-Tolerant Network and Vehicular Adhoc Netwwork 125
6.1 Overview of VANET Delay-Tolerant Networks 125
6.2 Characteristics of VDTN 126
6.3 DTN Protocols for VANET Delay-Tolerant Networks 127
7 Conclusions and Future Scope 128
References 128
Wireless Technology and Communications—Methodologies & Implementations
Architectural Building Protocols for Li-Fi (Light Fidelity) 131
1 Introduction 131
1.1 Visible Light Communication 132
1.2 Importance of VLC 132
1.3 Modes of Communication in VLC 133
2 Light Fidelity 133
2.1 Need of Li-Fi 133
2.2 Challenges for Li-Fi 134
2.3 Comparison of Li-Fi and Wi-Fi 135
2.4 Architecture of Li-Fi 136
2.5 Difference Between Photodiode and Image Sensor 137
2.6 Working of Li-Fi 137
3 Li-Fi Standardization and Its Integrated Communication Protocols Solution 138
3.1 OOK Modulation with Dimming 139
3.2 VPPM Modulation with Dimming 139
3.3 CSK Modulation with Dimming 140
3.4 Hybrid Li-Fi: Integrating Li-Fi with Wi-Fi 140
4 Conclusion and Future Scope 140
References 141
Infrastructure in Mobile Opportunistic Networks 142
1 Concept, Protocol and Architecture for Mobile Opportunistic Networks 142
1.1 Routing Protocols 143
2 Cooperative Framework for Building Opportunistic Networks 145
3 Recent Advances in Routing Methodologies 148
3.1 Challenges in Opportunistic Routing 149
4 Mobile Peer-to-Peer Content Dissemination Model in Load Balancing 151
5 Privacy and Forwarding Models in Mobile Opportunistic Networks 153
6 Concept for Pocket Switched Networks, Amorphous and Semantic Opportunistic Networks 154
6.1 Amorphous Opportunistic Networks 154
7 Future Research Trends in Mobile Opportunistic Networks 155
8 Conclusion 156
References 156
Generic Design and Advances in Wearable Sensor Technology 158
1 Introduction of Wearable Sensor-Based Systems—Design and Architecture 159
2 Challenges and Issue in Wearable Computing and Sensor Implications 160
3 Wireless Communication Standards Used in Wearable Technology 161
3.1 Short-Range Wireless Communication Standards for Wearable Sensors 161
3.2 Long-Range Wireless Communication Standards for Wearable Sensors 163
4 Design Antenna for Wearable Devices System 164
5 Inferences of Body Area Network System Architectures 164
5.1 Sensors Tire 164
5.2 Mobile Tire 165
5.3 Remote Server Tire 165
6 Wearable Sensor Based on Advanced Materials 166
6.1 Wearable Temperature Sensors 166
6.2 Wearable Strain Sensors 167
6.3 Wearable Devices for Sensing Change Through the Skin 167
6.4 Nanomaterials-Based Wearable Sensors 168
7 Power Harvesting for Wearable Devices System 168
7.1 Self-power Devices 168
7.2 Energy Harvesting from Heat of the Human Body 169
7.3 Rechargeable Micro-battery and Super-Capacitors for Energy Harvesting 169
7.4 Energy Harvesting from Electromagnetic Radio Frequency Spectrum 169
8 Use Case for Optics for Smart Glasses, Augmented Reality, and Virtual Reality Headsets 170
8.1 Augmented Reality Smart Glasses 170
8.2 Using Smart Glass in Surgical Education 170
8.3 Wearable Contact Lenses 171
9 Use Case in Health Monitoring and Prognosis 171
10 Conclusion 172
References 172
Realizing the Wireless Technology in Internet of Things (IoT) 175
1 Introduction of IoT with Emerging Wireless Technologies 176
1.1 Types of Communication Within the IoT and Challenges 176
1.2 Potential Applications 177
1.3 Privacy Hazards 178
2 Basic Elements for Forming IoT and Addressing the Issues Associated with It 178
2.1 Components of IoT 178
2.2 Application Protocols 179
2.3 Frequency Bands and Regulations 180
3 General Architecture and Factors Affecting IoT Centric Features 181
3.1 General Architecture and Reference Ones 181
3.2 IoT Key Performance Indicators 183
3.3 Security Threats and Countermeasures 184
4 Middleware Technology for Grooming IoT Essence 186
4.1 Middleware for Internet of Things: Challenges 186
4.2 Classification of IoT Middleware 186
4.3 Popular IoT Middleware 187
5 The Device-to-Device (D2D) Communications Protocol Stack 188
5.1 Device-to-Device (D2D) Communication Technologies 188
5.2 Characteristics of D2D Communication Within IoT 190
5.3 Existing Routing Algorithms and Protocols 191
6 Conclusions 192
References 192
Fast and Flexible Initial Uplink Synchronization for Long-Term Evolution 195
1 Background 195
1.1 Initial Uplink Synchronization (IUS) 195
1.2 Related Works 196
1.3 Emerging Challenges and Our Contributions 197
2 IUS Signal Representation 198
3 A Sparse Recovery Method 200
3.1 ell1 Optimization Strategy 201
3.2 Smoothed ell0 Norm Minimization isl0 202
4 Codebook Design 204
4.1 The Mutual Coherence 205
5 Zadoff–Chu Sequence Selection 205
5.1 Small CFO 205
5.2 Mitigating the Adverse Effects of CFO 207
6 Simulation Results 207
6.1 Performance Evaluation at Low CFO 208
6.2 Performance Evaluation at Larger CFO 210
7 Need of Advancement of IUS Algorithms for Future Wireless Communication 211
8 Conclusion 211
References 212
Wireless Technology and Communications—Advancement & Future Scope
Toward a “Green” Generation of Wireless Communications Systems 215
1 Introduction 215
2 RF Front-End Imperfection Models 217
2.1 Power Amplifier Nonlinear Distortion 217
2.2 Phase Noise 218
2.3 Analog-to-Digital Converter Quantization Noise 218
2.4 IQ Imbalances 219
2.5 Quantification of the RF Front-End Quality 220
3 Spectral Efficiency Using Full-Duplex 221
3.1 Self-interference Reduction Techniques: Antenna, RF, and Digital Cancelation with “Real-Life” Components 222
3.2 RF Imperfections on Full-Duplex Relays 225
3.3 Self-interference Channel Models 230
4 Massive MIMO Systems 232
4.1 Low Complexity RF Front-End Design 233
4.2 Power Efficiency and Linear Precoding Techniques 234
4.3 Numerical Evaluation 236
5 Summary of the Chapter 237
References 238
Security Attacks on Wireless Networks and Their Detection Techniques 241
1 Introduction 241
1.1 Introduction to Wireless Networking 242
1.2 Wireless Access Points 242
1.3 Advantages of Using Wireless Network 242
1.4 Communiqué Using Wireless Networks 244
1.5 Data Frames in Wireless Networking 245
2 Vulnerabilities in Wireless Network 246
2.1 Vulnerability Definition 246
2.2 Insecure Physical Location 247
2.3 Rogue Access Points 247
2.4 Physical Access Is Not Required 248
2.5 Inadequate Encryption and Decryption Standards 248
2.6 Unidentified Network Boundary 248
2.7 Insecure Wireless Network 249
3 Attacks in Wireless Network 249
3.1 Attack Definition 250
3.2 Attacks Classification in Wireless Networks 250
3.3 Denial-of-Service Attacks 252
3.4 Man-in-the-Middle Attacks 255
3.5 Wireless Cipher Attacks 257
3.6 Cryptocurrency Attacks 260
3.7 Accounts-Linked Attacks (Semantic Attacks) 261
3.8 Security Breaches 263
4 Wireless Defense Mechanism 263
4.1 Wireless Security Goals 264
4.2 Attack Detection Techniques 265
5 Conclusion 268
References 268
Spectrum Decision Mechanisms in Cognitive Radio Networks 271
1 Introduction 271
2 Spectrum Decision Overview 272
2.1 Spectrum Characterization 273
2.2 Spectrum Selection 274
2.3 CR Device Reconfiguration 275
2.4 Reinforcement Steps for Spectrum Decision 275
3 An Overview of Spectrum Decision Frameworks 276
3.1 Definition of Spectrum Decision Frameworks 276
3.2 Framework 1: A Spectrum Decision Framework for Cognitive Radio Networks 276
3.3 Framework 2: A QoS-Aware Framework for Available Spectrum Characterization and Decision in Cognitive Radio Networks 279
3.4 Framework 3: A Belief-Based Decision-Making Framework for Spectrum Selection in Cognitive Radio Networks 280
3.5 Framework 4: Reducing Spectrum Handoffs and Energy Switching Consumption of MADM-Based Decision in Cognitive Radio Networks 281
4 Discussion 291
4.1 Open Issues 291
4.2 Discussion of New Technologies in CRN 292
5 Conclusions 293
References 293
Vehicular Networks to Intelligent Transportation Systems 297
1 Introduction 297
2 Intelligent Transportation Systems 299
2.1 Architecture 299
2.2 Vehicular Ad Hoc Networks 300
2.3 Integration with Other Networks 302
3 Infrastructure and Services 303
3.1 ITS Infrastructure 303
3.2 Traffic Prediction 305
3.3 Mobility and Traffic 305
4 Data and Security in ITS 308
4.1 Data Collection and Quality 308
4.2 Security 310
5 Conclusion 313
References 313
State Estimation and Anomaly Detection in Wireless Sensor Networks 316
1 Introduction 316
2 Statistical Models for State Estimation 319
2.1 Linear Mixed Model 321
2.2 Modelling the General Effect of Time 322
2.3 Modelling the Random Effects of Time 322
2.4 Joint Likelihood Function and Parameter Estimation 323
2.5 Detection of Anomalous Node 323
3 Numerical Studies 325
3.1 Simulation 1 325
3.2 Simulation 2 327
4 Conclusions and Future Work 330
References 331
Experimental Wireless Network Deployment of Software-Defined and Virtualized Networking in 5G Environments 334
1 Introduction 334
2 Mobility Management in 5G Networks 336
2.1 Software-Defined Networking and Network Function Virtualization as Key Enablers 337
2.2 The Role of Network Slicing 338
3 Points of Attachment Virtualization 339
3.1 Overview of Existing Works 340
3.2 Virtualization Approaches and Their Signalling 340
3.3 Virtual Wi-Fi Access Point Evaluation 343
4 Bringing User Context to the Cloud 344
4.1 Virtualizing the User Equipment 345
4.2 Mobile Node Virtualization Procedures 346
4.3 Proof-of-Concept Prototype Evaluation 350
5 The Impact of Virtualization in 5G Scenarios 352
5.1 Mobile Operator 353
5.2 Mobile-Edge Computing 353
5.3 Smart-Cities 354
6 Use Case Scenario in Wireless Testbed 355
6.1 Deployment and Signalling 355
6.2 Scenario Evaluation 356
7 Conclusions and Future Work 356
References 357

Erscheint lt. Verlag 9.6.2018
Zusatzinfo IX, 360 p. 124 illus., 79 illus. in color.
Verlagsort Singapore
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Netzwerke
Informatik Software Entwicklung Mobile- / App-Entwicklung
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Schlagworte 5G Communication Systems • Cognitive Radio Networks • Cooperative Communication Networks • Delay Tolerant Network (DTN) • Internet of Things (IoT) • Li-Fi (Light-Fidelity) • Long Term Evaluation (LTE) • Mobile Opportunistic Networks • Reliable Cooperative Networks • Vehicular ad-hoc Network (VANET) • Wearable sensors • wireless networks
ISBN-10 981-13-0396-7 / 9811303967
ISBN-13 978-981-13-0396-8 / 9789811303968
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 11,3 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Robust and fast cross-platform application development

von Marco Cantu; Pawel Glowacki

eBook Download (2024)
Packt Publishing Limited (Verlag)
33,59