hh.sePublications
Change search
Refine search result
1234 1 - 50 of 157
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the 'Create feeds' function.
  • 1.
    Agelis, Sacki
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Jonsson, Magnus
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Visualizing the Potential of Reconfigurable Shuffle-Patterns in Optoelectronic Routers by the Use of MOEMS2004In: Proceedings of the IASTED International Conference Communication Systems and Networks / [ed] Salvador C.E.P., Calgary, Canada: ACTA Press, 2004, 148-154 p.Conference paper (Refereed)
    Abstract [en]

    A reconfigurable high performance multistage router architecture is presented and simulated. The router backbone network is an optical shuffle exchange network that has the power of reconfigurability through the use of micro-optical-electrical mechanical systems (MOEMS). The router is subjected to different application classes. The application classes have different characteristics in terms of symmetric/asymmetric traffic properties. We compare our reconfigurable shuffle-pattern for all three application classes for the specified router architecture.

  • 2.
    Ahmed, Rizwan
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Abbas, Shahid
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Electrical and Optical Characteristics of InP Nanowires based p-i-n Photodetectors2010Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Photodetectors are a kind of semiconductor devices that convert incoming light to an electrical signal. Photodetectors are classified based on their different structure, fabrication technology, applications and different sensitivity. Infrared photodetectors are widely used in many applications such as night vision, thermal cameras, remote temperature sensing, and medical diagnosis etc.

     

    All detectors have material inside that is sensitive to incoming light. It will absorb the photons and, if the incoming photons have enough energy, electrons will be excited to higher energy levels and if these electrons are free to move, under the effect of an external electric field, a photocurrent is generated.

     

    In this project Fourier Transform Infrared (FT-IR) Spectroscopy is used to investigate a new kind of photodiodes that are based on self-assembled semiconductor nanowires (NWs) which are grown directly on the substrate without any epi-layer. The spectrally resolved photocurrent (at different applied biases) and IV curves (in darkness and illumination) for different temperatures have been studied respectively. Polarization effects (at low and high Temperatures) have been investigated.  The experiments are conducted for different samples with high concentration of NWs as well as with lower concentration of NWs in the temperature range from 78 K (-195ºC) to 300 (27ºC). These photodiodes are designed to work in near infrared (NIR) spectral range.

     

    The results show that the NW photodetectors indeed are promising devices with fairly high break down voltage, change of photocurrent spectra with polarized light, low and constant reverse saturation current (Is). The impact of different polarized light on photocurrent spectra has been investigated and an attempt has been made to clarify the observed double peak of InP photocurrent spectrum. Our investigations also include a comparison to a conventional planar InP p-i-n photodetector.

     

  • 3.
    Akinola, Azeez Paul
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Zhang, Chong
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Evaluate Security on the Internet Cafe2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Internet security (Network security) is a big topic that is very important in our society communication system, but it is extremely dynamic and wide in scope. This is the reason that many companies and organizations invest heavily in a dedicated infrastructure security and highly trained specialists.The aim of security monitoring and preventing the network from cyber threats requires vigilance over the network equipment. The case study of this thesis is to provide the possible solution to the problems encountered by the namely network users such as: Internet Game Center (Centrum Halmstad, Sweden) and, the Blueville Internet Cafe (Ede, Nigeria).Our research and information collected over the telephone and a visit at the nearest office. We concluded that both companies mentioned above experienced similar cyber threats. The two companies have internal and external threats such as accessing the network via ssh by using it brute force attack, network war-driver, the installation of spyware, password sniffer, viruses, SQL injection and PHP attacks (web attacks) on the networks. The cyber threats virus and spyware are among the big internet threat to users, organization and companies.We carry out experiments in the lab to tests for threats such as brute force (ssh) attack, password sniffer and war-driver in the Wireless environment. From the results, we are able to the select WPA2 using 802.1x as the best possible way to limit and reduce the strength of cyber-attacks, and as a suggested solution to the namely café problems in our report. We also list different suggestion and solution to the cyber café attacks from our research papers and information gathers from different sources such as library, internet, seminar and textbooks.

  • 4.
    Andreev, Sergey
    et al.
    Department of Communications Engineering, Tampere University of Technology, Finland.
    Galinina, Olga
    Department of Communications Engineering, Tampere University, Finland of Technology.
    Vinel, Alexey
    Department of Communications Engineering, Tampere University, Finland of Technology.
    Performance Evaluation of a Three Node Client Relay System2011In: International Journal of Wireless Networks and Broadband Technologies, ISSN 2155-6261, Vol. 1, no 1, 73-84 p.Article in journal (Refereed)
    Abstract [en]

    In this paper, the authors examine a client relay system comprising three wireless nodes. Closed-form expressions for mean packet delay, as well as for throughput, energy expenditure, and energy efficiency of the source nodes are also obtained. The precision of the established parameters is verified by means of simulation.

  • 5.
    Aujla, Gagangeet Singh
    et al.
    Thapar University, Patiala, India.
    Chaudhary, Rajat
    Thapar University, Patiala, India.
    Kumar, Neeraj
    Thapar University, Patiala, India.
    Rodrigues, Joel J. P. C.
    National Institute of Telecommunications (Inatel), Santa Rita do Sapucaí, Brazil; University of Beira Interior, Covilhã, Portugal; ITMO University, St. Petersburg, Russia; University of Fortaleza (Unifor), Fortaleza, Brazil.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Data Offloading in 5G-Enabled Software-Defined Vehicular Networks: A Stackelberg-Game-Based Approach2017In: IEEE Communications Magazine, ISSN 0163-6804, E-ISSN 1558-1896, Vol. 55, no 8, 100-108 p.Article in journal (Refereed)
    Abstract [en]

    Data offloading using vehicles is one of the most challenging tasks to perform due to the high mobility of vehicles. There are many solutions available for this purpose, but due to the inefficient management of data along with the control decisions, these solutions are not adequate to provide data offloading by making use of the available networks. Moreover, with the advent of 5G and related technologies, there is a need to cope with high speed and traffic congestion in the existing infrastructure used for data offloading. Hence, to make intelligent decisions for data offloading, an SDN-based scheme is presented in this article. In the proposed scheme, an SDNbased controller is designed that makes decisions for data offloading by using the priority manager and load balancer. Using these two managers in SDN-based controllers, traffic routing is managed efficiently even with an increase in the size of the network. Moreover, a single-leader multi-follower Stackelberg game for network selection is also used for data offloading. The proposed scheme is evaluated with respect to several parameters where its performance was found to be superior in comparison to the existing schemes. © Copyright 2017 IEEE

  • 6.
    Balasubramaniam, Sasitharan
    et al.
    Tampere University of Technology, Tampere, Finland .
    Lyamin, Nikita
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Kleyko, Denis
    Luleå University of Technology, Luleå, Sweden.
    Skurnik, Mikael
    University of Helsinki, Helsinki, Finland .
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Koucheryavy, Yevgeni
    Tampere University of Technology, Tampere, Finland .
    Exploiting bacterial properties for multi-hop nanonetworks2014In: IEEE Communications Magazine, ISSN 0163-6804, E-ISSN 1558-1896, Vol. 52, no 7, 184-191 p.Article in journal (Refereed)
    Abstract [en]

    Molecular communication is a relatively new communication paradigm for nanomachines where the communication is realized by utilizing existing biological components found in nature. In recent years researchers have proposed using bacteria to realize molecular communication because the bacteria have the ability to swim and migrate between locations, carry DNA contents (i.e. plasmids) that could be utilized for information storage, and interact and transfer plasmids to other bacteria (one of these processes is known as bacterial conjugation). However, current proposals for bacterial nanonetworks have not considered the internal structures of the nanomachines that can facilitate the use of bacteria as an information carrier. This article presents the types and functionalities of nanomachines that can be utilized in bacterial nanonetworks. A particular focus is placed on the bacterial conjugation and its support for multihop communication between nanomachines. Simulations of the communication process have also been evaluated, to analyze the quantity of bits received as well as the delay performances. Wet lab experiments have also been conducted to validate the bacterial conjugation process. The article also discusses potential applications of bacterial nanonetworks for cancer monitoring and therapy. © 2014 IEEE.

  • 7.
    Balogh, Daniel
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Mohlin, Simon
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Teletrix2012Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Det trådbundna telefonnätet har blivit för dyrt att underhålla och utveckla. Därför håller Telia nu på att ta ner delar av det. För de abonnenter som berörs av detta har Telia en lösning som de kallar fast mobil. Istället för att abonnenterna ringer via det trådbundna nätet ringer de via GSM-nätet istället.Målet med detta examensarbete är att skapa en alternativ lösning till Telias. Vi börjar med att undersöka hur det analoga nätet fungerar. Därefter bygger vi ett eget analogt gränssnitt som kommunicerar med vanliga hemtelefoner. En mikroprocessor kommer att styra en GSM-modul och tolka signaler från det analoga gränssnittet.Resultatet av detta arbete är en apparatur som vi kallar Teletrix – en fast mobil. Med en Teletrix kan vanliga hemtelefoner ringa via GSM-nätet med god samtalskvalitet och med grundläggande funktioner som kopplingston och ringsignal.

  • 8.
    Belenko, Denis
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Noise measurements of a low power detector for RFID applications2012Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    In this work we provide measurements on low power envelope detector and compare them with results predicted by theory. This envelope detector is supposed to be used as a part of low power Wake-up radio for RFID applications. In the work we were mostly interested in noise parameters and blocker effect verification.

    The detector we use is based on CMOS transistors biased in subthreshold region. It gives us low power consumption and high sensitivity. For power consumption about 10 uA and signal to noise ratio equals to 10, the achieved sensitivity is 1.8 mV.

    The results of the work can be used to build low power envelope detector for specific requirements.

  • 9.
    Bellalta, Boris
    et al.
    Universitat Pompeu Fabra, Barcelona, Spain.
    Barcelo, Jaume
    Universidad Carlos III, Madrid, Spain.
    Staehle, Dirk
    University of Wurzburg, Wurzburg, Germany.
    Vinel, Alexey
    Department of Communications Engineering, Tampere University of Technology, Tampere, Finland.
    Oliver, Miquel
    Universitat Pompeu Fabra, Barcelona, Spain.
    On the performance of packet aggregation in IEEE 802.11ac MU-MIMO WLANs2012In: IEEE Communications Letters, ISSN 1089-7798, Vol. 16, no 10, 1588-1591 p.Article in journal (Refereed)
    Abstract [en]

    Multi-user spatial multiplexing combined with packet aggregation can significantly increase the performance of Wireless Local Area Networks (WLANs). In this letter, we present and evaluate a simple technique to perform packet aggregation in IEEE 802.11ac MU-MIMO (Multi-user Multiple Input Multiple Output) WLANs. Results show that in non-saturation conditions both the number of active stations (STAs) and the queue size have a significant impact on the system performance. If the number of STAs is excessively high, the heterogeneity of destinations in the packets contained in the queue makes it difficult to take full advantage of packet aggregation. This effect can be alleviated by increasing the queue size, which increases the chances of scheduling a large number of packets at each transmission, hence improving the system throughput at the cost of a higher delay. © 1997-2012 IEEE.

  • 10.
    Bellalta, Boris
    et al.
    Universitat Pompeu Fabra, Barcelona, Spain.
    Belyaev, Evgeny
    Tampere University of Technology, Finland.
    Jonsson, Magnus
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Performance evaluation of IEEE 802.11p-enabled vehicular video surveillance system2014In: IEEE Communications Letters, ISSN 1089-7798, Vol. 18, no 4, 708-711 p.Article in journal (Refereed)
    Abstract [en]

    Prospective IEEE 802.11p-based vehicular surveillance system, where video from the vehicle on-board camera is transmitted to the management center, is considered. Multi-hop transmission from the vehicle to the nearest roadside unit and then-via other roadside units-to the gateway is addressed. In this letter we assess the feasibility of such system by analyzing the video end-to-end distortion for a target vehicle, located several hops away from the gateway, when it is alone or there are also other vehicles transmitting video. We demonstrate the importance of dynamic adaptation of the video bit rate of each vehicle depending on the number and positions of the participating vehicles. © 2014 IEEE.

  • 11.
    Bellalta, Boris
    et al.
    Department of Information Technologies and Communications, Universitat Pompeu Fabra, Barcelona, Spain.
    Faridi, Azadeh
    Department of Information Technologies and Communications, Universitat Pompeu Fabra, Barcelona, Spain.
    Staehle, Dirk
    Department of Computer Science, University of Würzburg, Würzburg, Germany.
    Barcelo, Jaume
    Department of Information Technologies and Communications, Universitat Pompeu Fabra, Barcelona, Spain.
    Vinel, Alexey
    Department of Electronics and Communication Engineering, Tampere University of Technology, Tampere, Finland.
    Oliver, Miquel
    Department of Information Technologies and Communications, Universitat Pompeu Fabra, Barcelona, Spain.
    Performance analysis of CSMA/CA protocols with multi-packet transmission2013In: Computer Networks, ISSN 1389-1286, E-ISSN 1872-7069, Vol. 57, no 14, 2675-2688 p.Article in journal (Refereed)
    Abstract [en]

    Wireless objects equipped with multiple antennas are able to simultaneously transmit multiple packets by exploiting the channel's spatial dimensions. In this paper, we study the benefits of such Multiple Packet Transmission (MPT) approach, when it is used in combination with a Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol for fully interconnected networks, addressing the interactions between the two mechanisms and showing the performance gains that can be achieved. To this end, a very simple Media Access Control (MAC) protocol that captures the fundamental properties and tradeoffs of a CSMA/CA channel access protocol supporting MPT is introduced. Using this protocol as a reference, a new analytical model is presented for the case of non-saturated traffic sources with finite buffer space. Simulation results show that the analytical model is able to accurately characterize the steady-state behavior of the reference protocol for different number of antennas and different traffic loads, providing a useful tool for understanding the performance gains achieved by MAC protocols supporting MPT. © 2013 Elsevier B.V. All rights reserved.

  • 12.
    Bellalta, Boris
    et al.
    Universitat Pompeu Fabra, Barcelona, Spain.
    Zocca, Alessandro
    Eindhoven University of Technology, Eindhoven, The Netherlands.
    Cano, Cristina
    Hamilton Institute, Maynooth, Ireland.
    Checco, Alessandro
    Hamilton Institute, Maynooth, Ireland.
    Barcelo, Jaume
    Universitat Pompeu Fabra, Barcelona, Spain.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Throughput Analysis in CSMA/CA Networks Using Continuous Time Markov Networks: A Tutorial2014In: Wireless Networking for Moving Objects / [ed] Ivan Ganchev, Marília Curado, Andreas Kassler, Cham: Springer, 2014, 115-133 p.Chapter in book (Refereed)
    Abstract [en]

    This book chapter introduces the use of Continuous Time Markov Networks (CTMN) to analytically capture the operation of Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) networks. It is of tutorial nature, and it aims to be an introduction on this topic, providing a clear and easy-to-follow description. To illustrate how CTMN can be used, we introduce a set of representative and cutting-edge scenarios, such as Vehicular Ad-hoc Networks (VANETs), Power Line Communication networks and multiple overlapping Wireless Local Area Networks (WLANs). For each scenario, we describe the specific CTMN, obtain its stationary distribution and compute the throughput achieved by each node in the network. Taking the per-node throughput as reference, we discuss how the complex interactions between nodes using CSMA/CA have an impact on system performance.

  • 13.
    Belyaev, Evgeny
    et al.
    Technical University of Denmark, Lyngby, Denmark.
    Moreschini, Sergio
    Tampere University of Technology, Tampere, Finland.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Uncoordinated multi-user video streaming in VANETs using Skype2017In: 2017 IEEE 22nd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2017Conference paper (Refereed)
    Abstract [en]

    Real-time video delivery in Vehicle-to-Infrastructure (V2I) scenario enables a variety of multimedia vehicular services. We conduct experiments with Dedicated Short Range Communications (DSRC) transceivers located in the mutual proximity and exchanging Skype video calls traffic. We demonstrate that the lack of coordination between the users both at the application as well as Medium Access Control (MAC) layers results in problems with quality of service provisioning even for the setup without vehicular mobility. © Copyright 2017 IEEE

  • 14.
    Belyaev, Evgeny
    et al.
    Tampere University of Technology, Tampere, Finland.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Poster: Target Packet Loss Selection for Inter-Packet Loss Protection for Video Streaming Over VANETs2014In: 2014 IEEE Vehicular Networking Conference (VNC) / [ed] Falko Dressler, Onur Altintas, Suman Banerjee, Björn Scheuermann & David Eckhoff, Piscataway, N.J.: IEEE Press, 2014, 197-198 p.Conference paper (Refereed)
    Abstract [en]

    This work is dedicated to a live video streaming in vehicular networks where the application-based inter-packet forward error correction is used for the packet loss protection. A practical way to apply such a protection at the video encoder side for the unknown channel loss rate is proposed. Experimental results which demonstrate the performance for the proposed approach for a scalable extension of the H.264/AVC standard (H.264/SVC) and for the non-standardized video codec based on three-dimensional discrete wavelet transform (3-D DWT) are provided.

  • 15.
    Belyaev, Evgeny
    et al.
    Tampere University of Technology, Tampere, Finland .
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES). Tampere University of Technology, Tampere, Finland.
    Egiazarian, Karen
    Tampere University of Technology, Tampere, Finland.
    Koucheryavy, Yevgeni
    Tampere University of Technology, Tampere, Finland.
    Power Control in See-Through Overtaking Assistance System2013In: IEEE Communications Letters, ISSN 1089-7798, E-ISSN 1558-2558, Vol. 17, no 3, 612-615 p., 6423758Article in journal (Refereed)
    Abstract [en]

    In recently proposed cooperative overtaking assistance systems a video stream captured by a windshield-mounted camera in a vehicle is compressed and broadcast to the vehicle driving behind it, where it is displayed to the driver. It has been shown that this system can provide robust operation if video codec channel adaptation is undertaken by exploiting information from the cooperative awareness messages about any forthcoming increases in the multiple access channel load. In this letter we demonstrate the gains achievable in system performance when the video transmitter power control is also used. © 1997-2012 IEEE.

  • 16.
    Belyaev, Evgeny
    et al.
    Tampere University of Technology, Tempere, Finland.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Jonsson, Magnus
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Sjöberg, Katrin
    Volvo GTT, Göteborg, Sweden.
    Live video streaming in IEEE 802.11p vehicular networks: Demonstration of an automotive surveillance application2014In: Computer Communications Workshops (INFOCOM WKSHPS), 2014 IEEE Conference on, Piscataway, United States: IEEE Press, 2014, 131-132 p.Conference paper (Refereed)
    Abstract [en]

    Prospective IEEE 802.11p-enabled automotive video applications are identified. Preliminary experimental results of inter-vehicular live video streaming for surveillance applications are presented. A test-bed for the demonstration of the achievable visual quality under different channel conditions is described.

  • 17.
    Belyaev, Evgeny
    et al.
    Tampere University of Technology, Tampere, Finland.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Surak, Adam
    Tampere University of Technology, Tampere, Finland.
    Gabbouj, Moncef
    Tampere University of Technology, Tampere, Finland.
    Jonsson, Magnus
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Egiazarian, Karen
    Tampere University of Technology, Tampere, Finland.
    Robust vehicle-to-infrastructure video transmission for road surveillance applications2015In: IEEE Transactions on Vehicular Technology, ISSN 0018-9545, E-ISSN 1939-9359, Vol. 64, no 7, 2991-3003 p.Article in journal (Refereed)
    Abstract [en]

    IEEE 802.11p vehicle-to-vehicle and vehicle-to-infrastructure communication technology is currently an emerging research topic in both industry and academia. Respective spectrum allocation of 10 MHz channels in the 5.9 GHz band for USA and Europe allows considering inter-vehicle transmission of a live video information as a basis, which enables a new class of safety and infotainment automotive applications such as road video surveillance. This paper is first of its kind where such a video transmission system is developed and experimentally validated. We propose a low-complexity unequal packet loss protection and rate control algorithms for a scalable video coding based on the three-dimensional discrete wavelet transform. We show that in comparison with a scalable extension of the H.264/AVC standard the new codec is less sensitive to packet losses, has less computational complexity and provides comparable performance in case of unequal packet loss protection. It is specially designed to cope with severe channel fading typical for dynamic vehicular environments and has a low complexity, making it a feasible solution for real-time automotive surveillance applications. Extensive measurements obtained in realistic city traffic scenarios demonstrate that good visual quality and continuous playback is possible when the moving vehicle is in the radius of 600 meters from the roadside unit. ©2014 IEEE

  • 18.
    Bengtsson, Henrik
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Uhlemann, Elisabeth
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Wiberg, Per-Arne
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Protocol for wireless real-time systems1999In: Proceedings of the 11th Euromicro Conference on Real-Time Systems, 1999, Los Alamitos, CA: IEEE Computer Society , 1999, 168-174 p.Conference paper (Refereed)
    Abstract [en]

    A protocol and a communication mechanism intended for time and safety critical applications using a radio channel for information transport are considered jointly. The protocol is based on a scheme of retransmissions done on demand within a given time window. Each retransmission is coded with a varying number of redundant symbols. The set of blocks used for retransmission is controlled by two quality-of-service parameters: deadline for the transmission and the probability that the correct decoded message will reach the recipient before this deadline. Analysis of a protocol model indicates that it is possible to transmit time critical information in a mobile wireless system with very low error probabilities in an industrial environment.

  • 19.
    Berbineau, Marion
    et al.
    IFSTTAR, Villeneuve d’Ascq, France.
    Jonsson, MagnusHalmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).Bonnin, Jean-MarieTelecom Bretagne, Cesson Sévigné, France.Cherkaoui, SoumayaUniversité de Sherbrooke, Canada.Aguado, MarinaUniversity of the Basque Country, Bilbao, Spain.Rico Garcia, CristinaDLR, German Aerospace Center, Oberpfaffenhofen-Wessling, Germany.Ghannoum, HassanSNCF, Paris, France.Mehmood, RashidUniversity of Huddersfield, UK.Vinel, AlexeyTampere University of Technology, Finland.
    Communication Technologies for Vehicles: 5th International Workshop, Nets4Cars/Nets4Trains 2013, Villeneuve d' Ascq, France, May 14-15, 2013, Proceedings2013Conference proceedings (editor) (Refereed)
  • 20.
    Bergholm, Johan
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Gallardo, Sascha
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Svensson, Jonny
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Positionering och Spårning av mobila enheter, ur ett IT–forensiskt perspektiv2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    I dagens Sverige så har de mobila enheterna en självklar plats i våra fickor, likväl som i vårt samhälle och i dess brottslighet, vilket gör att det sedan några år är att anse självklart att de även har en central roll i IT–forensiska utredningar inom våra polismyndigheter. Men vid sidan av konkreta bevis för begångna brott lagrar enheterna dessutom ofta data som kan användas för att spåra enheten, och därmed också dess brukare, över tid, vilket givetvis är av intresse av polismyndigheter men skulle även kunna vara av stort intresse för exempelvis försäkringsbolag och andra delar av den 'civila sektorn' som driver utredningar men som saknar polisens befogenheter. För att ge ett så brett användningsområde som möjligt fokuserar därför rapporten inte bara på datat som är tillgängligt från den faktiska enheten och hur de kan användas för spårning och positionering, utan försöker även på praktiskt väg undersöka i vilken grad dessa metoder kan utföras med allmänt tillgänglig mjuk- och hårdvara.

  • 21.
    Bilstrup, Katrin
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Böhm, Annette
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Lidström, Kristoffer
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Jonsson, Magnus
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Larsson, Tony
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Uhlemann, Elisabeth
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Report on the Collaboration between CVIS and CERES in the Project Vehicle Alert System (VAS)2009Report (Other academic)
    Abstract [en]

    In March 2007, an agreement was made for interchange of experiences between CVIS and the Centre for Research on Embedded Systems (CERES) at Halmstad University in Sweden. The majority of the work relating to this collaboration has been conducted within the CERES project Vehicle Alert System (VAS), aiming to use vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications to provide different types of warning messages. The main focus of the VAS project is on communication and in particular the lower layers of the communication stack are investigated. VAS involves academic researchers from Halmstad University as well as researchers from Volvo Technology, SP Technical Research Institute of Sweden and the company Free2move. This report presents the results of the VAS project, its publications, and other issues of interest both to the CVIS consortium as well as a broader scope.

  • 22.
    Bilstrup, Katrin
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Uhlemann, Elisabeth
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Ström, Erik G.
    Chalmers.
    Medium access control in vehicular networks based on the upcoming IEEE 802.11p standard2008In: World Congress on Intelligent Transport Systems (ITS), 2008, World Congress on ITS , 2008, 12- p.Conference paper (Refereed)
    Abstract [en]

    In this paper, initial simulations are presented showing that the upcoming IEEE 802.11p standard is not suitable for traffic safety applications requiring reliable, low delay communication between vehicles. The medium access control procedure is one of the most important parts in the design of delay-constrained communication systems, and emerging vehicle safety applications put new stringent demands on timely and reliable delivery of data packets. The medium access procedure used in 802.11p is carrier sense multiple access, which is inherently unsuitable for time-critical data traffic since it is contention-based and cannot provide a finite upper bound on the time to channel access. The simulation results indicate that with IEEE 802.11p, channel access cannot be granted in a manner that is sufficiently predictable to support reliable, low-delay communications between vehicles on a highway.

  • 23.
    Bilstrup, Katrin
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Uhlemann, Elisabeth
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Ström, Erik G.
    Chalmers.
    Bilstrup, Urban
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Evaluation of the IEEE 802.11p MAC method for vehicle-to-vehicle communication2008In: 68th IEEE Vehicular Technology Conference, 2008. VTC 2008-Fall: IEEE Vehicular Technology Conference (VTC) (2008), Piscataway, N.J.: IEEE Press, 2008, 1-5 p.Conference paper (Refereed)
    Abstract [en]

    In this paper the medium access control (MAC) method of the upcoming vehicular communication standard IEEE 802.11p has been simulated in a highway scenario with periodic broadcast of time-critical packets (so-called heartbeat messages) in a vehicle-to-vehicle situation. The 802.11p MAC method is based on carrier sense multiple access (CSMA) where nodes listen to the wireless channel before sending. If the channel is busy, the node must defer its access and during high utilization periods this could lead to unbounded delays. This well-known property of CSMA is undesirable for time critical communications. The simulation results reveal that a specific node/vehicle is forced to drop over 80% of its heartbeat messages because no channel access was possible before the next message was generated. To overcome this problem, we propose to use self-organizing time division multiple access (STDMA) for real-time data traffic between vehicles. This MAC method is already successfully applied in commercial surveillance applications for ships (AIS) and airplanes (VDL mode 4). Our initial results indicate that STDMA outperforms CSMA for time-critical traffic safety applications in ad hoc vehicular networks.

  • 24.
    Bilstrup, Katrin
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Uhlemann, Elisabeth
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Ström, Erik G.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Bilstrup, Urban
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    On the ability of the 802.11p MAC method and STDMA to support real-time vehicle-to-vehicle communications2009In: EURASIP Journal on Wireless Communications and Networking, ISSN 1687-1472, E-ISSN 1687-1499, Vol. 2009, no 902414, 1-14 p.Article in journal (Refereed)
    Abstract [en]

    Traffic safety applications using vehicle-to-vehicle (V2V) communication is an emerging and promising area within the intelligent transportation systems (ITS) sphere. Many of these new applications require real-time communication with high reliability, meaning that packets must be successfully delivered before a certain deadline. Applications with early deadlines are expected to require direct V2V communications, and the only standard currently supporting this is the upcoming IEEE 802.11p, included in the wireless access in vehicular environment (WAVE) stack. To meet a real-time deadline, timely and predictable access to the channel is paramount. However, the medium access method used in 802.11p, carrier sense multiple access with collision avoidance (CSMA/CA), does not guarantee channel access before a finite deadline. In this paper, we analyze the communication requirements introduced by traffic safety applications, namely, low delay, reliable, real-time communications.We show by simulation of a simple, but realistic, highway scenario, that vehicles using CSMA/CA can experience unacceptable channel access delays and, therefore, 802.11p does not support real-time communications. In addition, we present a potential remedy for this problem, namely, the use of self-organizing time division multiple access (STDMA). The real-time properties of STDMA are investigated by means of the same highway simulation scenario, with promising results.

  • 25.
    Bilstrup, Katrin
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Uhlemann, Elisabeth
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Ström, Erik G.
    Chalmers, Gothenburg.
    Bilstrup, Urban
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    On the ability of the IEEE 802.11p and STDMA to provide predictable channel access2009In: Proceedings of the 16th World Congress on Intelligent Transport Systems (ITS), 2009, 10- p.Conference paper (Refereed)
    Abstract [en]

    Emerging traffic safety applications requiring low delay communications will need vehicle ad-hoc networks. The only communication standard currently supporting this is IEEE 802.11p. However, 802.11p uses the medium access method CSMA/CA, which has a major drawback: unbounded worst case channel access delay. We therefore propose an algorithm already in commercial use in the shipping industry: STDMA. With STDMA, nodes always get predictable channel access regardless of the number of competing nodes and the maximum delay is deterministic. In this paper we elaborated with different parameter settings for the two protocols with the aim of improving performance without altering the standards.

     

  • 26.
    Bilstrup, Urban
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Bluetooth and Wireless Multihop Networks in Industrial Communication Systems2008Doctoral thesis, monograph (Other academic)
    Abstract [en]

    The objective of this thesis is to investigate the use of short-range wireless communication technology in industrial communication systems where there is a need for guaranteed timely delivery of correct information. Methods for achieving such capability are developed in the context of the physical layer, the data link layer and the application layer. Based on the insight that it is impossible to achieve strict determinism in a wireless communication system, a probabilistic definition of hard real-time systems is suggested, and thus a guarantee is given in the form of the probability of fulfilling a certain goal. Since a wireless channel is time variant, it is also necessary to continuously keep track of available resources. Allocation and link management methods for wireless communication systems therefore need to be dynamic and of an online character. An exhaustive resource allocation method with redundancy is first proposed for single message delivery and then extended for the operation of a single Bluetooth piconet. However, many devices in an industrial automation system have limited computational resources, especially if wireless sensors/actuators powered by battery or wireless power are considered. This implies that methods used for resource allocation must be of low computational complexity. The complexity issue becomes evident when large systems are implemented, even if each individual sensor generates small amounts of data. The upstream and downstream flows of data grow rapidly in a hierarchical system with many sub-systems, sensors and actuators. It is empirically shown that the aggregated data flow in a monitoring system requires powerful communication nodes already at low levels in the industrial communication hierarchy. A predictable system requires that representative entities for the available resources are defined. In a communication system with a single broadcast domain, such as a single Bluetooth piconet, the resource space is often limited to the time domain. When a multihop wireless network with multiple broadcast domains is considered, the spatial domain is added as an available resource and, if a multi-channel radio transceiver is used, the frequency is also added as an available resource domain. These three domains represent the physical resource space that is available for a wireless multihop network. These are subject to trade-off in all of the three lowest protocol layers, and one of the most challenging problems in the design of a wireless multihop network is how to achieve efficient sharing of these resources. This problem is addressed by proposing a clustered architecture based on a dual-radio node that enables dynamic use of these resource domains.

  • 27.
    Böhm, Annette
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Jonsson, Magnus
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Kunert, Kristina
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Context-Aware Retransmission Scheme for Increased Reliability in Platooning Applications2014In: Communication Technologies for Vehicles: 6th International Workshop, Nets4Cars/Nets4Trains/Nets4Aircraft 2014, Offenburg, Germany, May 6-7, 2014. Proceedings, Cham: Springer, 2014, 30-42 p.Conference paper (Refereed)
    Abstract [en]

    Recent advances in cooperative driving hold the potential to significantly improve safety, comfort and efficiency on our roads. An application of particular interest is platooning of vehicles, where reduced inter-vehicle gaps lead to considerable reductions in fuel consumption. This, however, puts high requirements on timeliness and reliability of the underlying exchange of control data. Considering the difficult radio environment and potentially long distances between communicating platoon members, as well as the random channel access method used by the IEEE 802.11p standard for short-range inter-vehicle communication, those requirements are very difficult to meet. The relatively static topology of a platoon, however, enables us to preschedule communication within the platoon over a dedicated service channel. Furthermore, we are able to set aside parts of the available bandwidth for retransmission of packets in order to fulfil the reliability requirements stated by the platoon control application. In this paper, we describe the platooning framework along with the scheduling algorithm used to assign retransmission slots to control packets that are most likely to need them. This retransmission scheduling scheme offers a valuable tool for system designers when answering questions about the number of safely supported vehicles in a platoon, achievable reductions in inter-vehicle gaps and periodicity of control packets. © 2014 Springer International Publishing.

  • 28.
    Campolo, Claudia
    et al.
    Mediterranea University of Reggio Calabria, Reggio Calabria, Italy.
    Molinaro, Antonella
    Mediterranea University of Reggio Calabria, Reggio Calabria, Italy.
    Berthet, Antoine O.
    Gif-sur-Yvette, CNRS-Centrale Supélec-Université Paris Sud, Gif-sur-Yvette, France.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Full-Duplex Radios for Vehicular Communications2017In: IEEE Communications Magazine, ISSN 0163-6804, E-ISSN 1558-1896, Vol. 55, no 6, 182-189 p.Article in journal (Refereed)
    Abstract [en]

    Recent significant advances in self-interference cancellation techniques pave the way for the deployment of full-duplex wireless transceivers capable of concurrent transmission and reception on the same channel. Despite the promise to theoretically double the spectrum efficiency, full-duplex prototyping in off-the-shelf chips of mobile devices is still in its infancy, mainly because of the challenges in mitigating self-interference to a tolerable level and the strict hardware constraints. In this article, we argue in favor of embedding full-duplex radios in onboard units of future vehicles. Unlike the majority of mobile devices, vehicular onboard units are good candidates to host complex FD transceivers because of their virtually unlimited power supply and processing capacity. Taking into account the effect of imperfect SI cancellation, we investigate the design implications of full-duplex devices at the higher-layer protocols of next-generation vehicular networks and highlight the benefits they could bring with respect to half-duplex devices in some representative use cases. Early results are also provided that give insight into the impact of self-interference cancellation on vehicle-to-roadside communications, and showcase the benefits of FD-enhanced medium access control protocols for vehicle-to-vehicle communications supporting crucial road safety applications.

  • 29.
    Campolo, Claudia
    et al.
    Dipartimento di Informatica, Matematica, Elettronica e Trasporti, University Mediterranea of Reggio Calabria, Reggio Calabria, Italy.
    Molinaro, Antonella
    Dipartimento di Informatica, Matematica, Elettronica e Trasporti, University Mediterranea of Reggio Calabria, Reggio Calabria, Italy.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    To switch or not to switch: Service discovery and provisioning in multi-radio V2R communications2016In: Proceedings of 2016 8th International Workshop on Resilient Networks Design and Modeling (RNDM) / [ed] Magnus Jonsson, Jacek Rak, Arun Somani, Dimitri Papadimitriou & Alexey Vinel, Piscataway: IEEE Press, 2016, 281-287 p.Conference paper (Refereed)
    Abstract [en]

    Abstract:A rich portfolio of services (e.g., road traffic information, maps download, Internet/cloud access) will be delivered to users on wheels through Vehicular Ad Hoc Networks (VANETs).Most of them will be offered by road-side units (RSUs) sparsely deployed along the roads. The prompt access to such services by passing by vehicles highly relies on the efficiency of service announcement procedures performed by the RSUs. In this paper, we present an analytical framework that models the service discovery and access mechanisms in multi-channel vehicular networks. The model accounts for dual-radio devices under different channel configurations for the delivery of announcements (e.g., on the control channel, on a service channel) and related switching mechanisms. Guidelines are suggested for the setting of service announcements parameters and channel configuration to allow providers to boost service provisioning. ©2016 by IEEE 

  • 30.
    Campolo, Claudia
    et al.
    Mediterranea University of Reggio Calabria, Reggio Calabria, Italy.
    Molinaro, Antonella
    Mediterranea University of Reggio Calabria, Reggio Calabria, Italy.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Understanding Adjacent Channel Interference in Multi-Channel VANETs2014In: 2014 IEEE Vehicular Networking Conference (VNC) / [ed] Falko Dressler, Onur Altintas, Suman Banerjee, Björn Scheuermann & David Eckhoff, Piscataway, NJ: IEEE Press, 2014, 101-104 p., 7013316Conference paper (Refereed)
    Abstract [en]

    Multiple channels have been allocated in the 5 GHz spectrum for vehicular communications worldwide, however, due to the limited allocated bandwidth, simultaneous communications occurring over nearby channels may be affected by adjacent channel interference (ACI). Due to ACI, packet reception may be unsuccessful and transmissions may be delayed. In this work, we investigate the ACI phenomena in multichannel vehicular networks to shed light on their effects, with focus on the transmitter-side. To this purpose, a simple analytical model is introduced along with a preliminary evaluation. Suggestions are also provided about the usage of adjacent channels so to minimize side effects on the communication quality. © 2014 IEEE

  • 31.
    Campolo, Claudia
    et al.
    University Mediterranea of Reggio Calabria, Reggio Calabria, Italy.
    Molinaro, Antonella
    University Mediterranea of Reggio Calabria, Reggio Calabria, Italy.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Zhang, Yan
    Simula Research Laboratory, Fornebu, Norway.
    Modeling and enhancing infotainment service access in vehicular networks with dual-radio devices2016In: Vehicular Communications, ISSN 2214-2096, Vol. 6, 7-16 p.Article in journal (Refereed)
    Abstract [en]

    A dedicated spectrum portion at 5 GHz is available to provide services in vehicular environments (e.g., road safety, traffic efficiency, comfort and infotainment services). The multitude of non-safety critical services offered by roadside and mobile providers can be accessed by vehicles under radio coverage if they listen to the advertisement messages announcing the service configuration parameters and tune to the announced frequency to access the service. Due to intermittent and short connectivity periods, timely and successful advertisements reception is crucial to enable a vehicle accessing available services while it is still connected to the provider.

    In this paper, we design an analytical model of the service advertisement and access procedure for dual-radio vehicular devices. Moreover, we enhance the advertisement phase with a simple technique of message repetition and channel switching coordination, which helps in making vehicles aware of local services promptly coping with channel impairments and collisions. The model flexibly accounts for channel switching, message repetitions, access prioritization, and interference by contending traffic on the channel where service announcements are regularly transmitted. ©2016 Elsevier Inc. All rights reserved.

  • 32.
    Campolo, Claudia
    et al.
    Dipartimento di Informatica, Matematica, Elettronica e Trasporti, University Mediterranea of Reggio Calabria, Reggio Calabria, Italy.
    Molinaro, Antonella
    Dipartimento di Informatica, Matematica, Elettronica e Trasporti, University Mediterranea of Reggio Calabria, Reggio Calabria, Italy.
    Vinel, Alexey
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Zhang, Yan
    Simula Research Laboratory, Fornebu, Norway.
    Modeling Event-Driven Safety Messages Delivery in IEEE 802.11p/WAVE Vehicular Networks2013In: IEEE Communications Letters, ISSN 1089-7798, Vol. 17, no 12, 2392-2395 p.Article in journal (Refereed)
    Abstract [en]

    A stochastic model is designed to assess the delivery performance of event-driven safety messages in IEEE 802.11p/1609.4 vehicular ad-hoc networks (VANETs). The study focuses on the case of a vehicle detecting an unpredictable hazard and broadcasting the alert in the one-hop neighborhood. The model aims at providing quick insights into the impact of the latest WAVE specifications (i.e., traffic differentiation, channel switching) on the delivery of such short-lived alert messages. Results prove that it is accurate in capturing the effect of relevant parameters and show that repeating the alert transmission on the control channel helps to achieve reliable delivery. © 2013 IEEE.

  • 33.
    Campolo, Claudia
    et al.
    Dipartimento di Informatica, Matematica, Elettronica e Trasporti, University Mediterranea of Reggio Calabria.
    Molinaro, Antonella
    Dipartimento di Informatica, Matematica, Elettronica e Trasporti, University Mediterranea of Reggio Calabria.
    Vinel, Alexey
    Department of Communications Engineering, Tampere University of Technology.
    Zhang, Yan
    Simula Research Laboratory.
    Modeling Prioritized Broadcasting in Multichannel Vehicular Networks2012In: IEEE Transactions on Vehicular Technology, ISSN 0018-9545, E-ISSN 1939-9359, Vol. 61, no 2, 687-701 p.Article in journal (Refereed)
    Abstract [en]

    Effective data broadcasting is essential in vehicular networks not only for road-safety message dissemination but also to aid routing and cooperative driving applications through periodic beaconing and to spread network initialization advertisements that are mandatory to support infotainment applications. Broadcast data are neither acknowledged nor retransmitted in case of failure, which raises the possibility of frame loss due to channel errors and collisions with multiple simultaneous broadcasts. This paper aims at modeling periodic broadcasting on the control channel of IEEE Std. 802.11p vehicular networks with multichannel architecture. Unlike previous related work, the proposed novel analytical approach accounts for mutual influence among nodes, frequent periodic updates of broadcasted data, standard network advertisement procedures, and 802.11p prioritized channel access with multichannel-related phenomena under various link quality conditions. © 2012 IEEE.

  • 34.
    Campolo, Claudia
    et al.
    Dipartimento di Informatica, Matematica, Elettronica e Trasporti, University Mediterranea of Reggio Calabria, Italy.
    Vinel, Alexey
    Department of Communications Engineering, Tampere University of Technology.
    Molinaro, Antonella
    Dipartimento di Informatica, Matematica, Elettronica e Trasporti, University Mediterranea of Reggio Calabria, Italy.
    Koucheryavy, Yevgeni
    Department of Communications Engineering, Tampere University of Technology.
    Modeling Broadcasting in IEEE 802.11p/WAVE Vehicular Networks2011In: IEEE Communications Letters, ISSN 1089-7798, Vol. 15, no 2, 199-201 p.Article in journal (Refereed)
    Abstract [en]

    IEEE 802.11p/WAVE (Wireless Access in Vehicular Environments) is an emerging family of standards intended to support wireless access in Vehicular Ad Hoc Networks (VANETs). Broadcasting of data and control packets is expected to be crucial in this environment. Both safety-related and non-safety applications rely on broadcasting for the exchange of data or status and advertisement messages. Most of the broadcasting traffic is designed to be delivered on a given frequency during the control channel (CCH) interval set by the WAVE draft standard. The rest of the time, vehicles switch over to one of available service channels (SCHs) for non-safety related data exchange. Although broadcasting in VANETs has been analytically studied, related works neither consider the WAVE channel switching nor its effects on the VANET performance. In this letter, a new analytical model is designed for evaluating the broadcasting performance on CCH in IEEE 802.11p/WAVE vehicular networks. This model explicitly accounts for the WAVE channel switching and computes packet delivery probability as a function of contention window size and number of vehicles. © 2011 IEEE.

  • 35.
    Charpentier Rojas, Jose Enrique
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Web application Security2013Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    Problems related to web application security comes in many ways, one example is inexperience programmers but not only in the way they code and program but also which language and structure they use to code. Not only programmers but Software companies left holes in the software they developed of course without intention.Because is proven that most of the vulnerabilities start in the web application side, as developers we need to follow certain principles, test our code and learn as much as possible about the subject, as a foundation of web application security in order to know how to prevent issues to the most significant treats.The penetration test aimed to help the IT business to discover vulnerabilities in their system ensure their integrity and continue further in the web application security process. The vulnerability research perform in this report is the introduction of a big work that is under continuity for the company.Finally the success of following security standards, process and methodologies applied on this field is considered the best approach to ensure web application security and priceless information you can benefit from.

  • 36.
    Chen, Chengshang
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Rear Approaching Vehicle Detection with Microphone2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    When a cyclist is cycling on a suburban road, it’s a problem to notice fast rear approaching vehicles in some cases. Looking back frequently is not a good idea. Finding some technical way to help cyclist perceiving rear approaching vehicles is quite necessary.

    This project aims to find some proper sensor to detect rear approaching vehicles. It’s separated into three steps. First, choose the suitable sensor and capture data. Then, find proper analyzing tool to analyze the capture data. Last but not least, draw a conclusion after analyzing contrast.

    Microphone is chosen as the sensor to recording the sounds form rear approaching vehicles. ”iRig Recorder FREE” is the program to transfer audio format. And the analyzing tool is to be Matlab. Matlab audio analysis makes good frequency spectrum for each piece of audio data. According to the frequency spectrum, the unique amplitude change around 1000 Hz is found when there is a rear approaching vehicle. This change is always distinct with or without noise.

    After getting the spectrum of different audio sources, the cross-correlation coefficient between 800 Hz and 1200 Hz is computed to see the correlation level. Then according to cross-correlation coefficient between new captured data and knowledge data, we can determine if there is a rear approaching vehicle in the new data or not.

    So, this project proves that the cross-correlation coefficient of frequency spectrum can determine if there is rear approaching vehicles or not. The future work would be automatic computer detect depending on this method.

  • 37.
    Cristofer, Englund
    et al.
    Viktoria Swedish ICT, Gothenburg, Sweden.
    Chen, Lei
    Viktoria Swedish ICT, Gothenburg, Sweden.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Lin, Shih-Yang
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Future Applications of VANETs2015In: Vehicular Ad Hoc Networks: Standards, Solutions, and Research / [ed] Claudia Campolo, Antonella Molinaro & Riccardo Scopigno, Cham: Springer Publishing Company, 2015, 525-544 p.Chapter in book (Refereed)
    Abstract [en]

    Current transportation systems face great challenges due to the increasing mobility. Traffic accidents, congestion, air pollution, etc., are all calling for new methods to improve the transportation system. With the US legislation in progress over vehicle communications and EU’s finalization of the basic set of standards over cooperative intelligent transportation systems (C-ITS), vehicular ad hoc network (VANET) based applications are expected to address those challenges and provide solutions for a safer, more efficient and sustainable future intelligent transportation systems (ITS). In this chapter, transportation challenges are firstly summarized in respect of safety, efficiency, environmental threat, etc. A brief introduction of the VANET is discussed along with state of the art of VANET-based applications. Based on the current progress and the development trend of VANET, a number of new features of future VANET are identified, together with a set of potential future ITS applications. The on-going research and field operational test projects, which are the major enabling efforts for the future VANET-based C-ITS, are presented. The chapter is of great interest to readers working within ITS for current development status and future trend within the C-ITS area. It is also of interest to general public for an overview of the VANET enabled future transportation system. © Springer International Publishing Switzerland 2015.

  • 38.
    Dorrell, David G.
    et al.
    University of Technology Sydney, Sydney, New South Wales, Australia.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Cao, Dongpu
    Cranfield University, Bedford, United Kingdom.
    Connected Vehicles – Advancements in Vehicular Technologies and Informatics2015In: IEEE transactions on industrial electronics (1982. Print), ISSN 0278-0046, E-ISSN 1557-9948, Vol. 62, no 12, 7824-7826 p., 7322333Article in journal (Refereed)
    Abstract [en]

    Vehicles are becoming increasingly more sophisticated and the technology being developed in them covers a number of areas. At the heart of these developments are often the communication, information and control systems. This is very much illustrated in this "Special Section on Connected Vehicles - Advancements in Vehicular Technologies and Informatics" of the IEEE Transactions on Industrial Electronics that we are pleased to present. The Special Section contains twelve papers related to automotive technology. Obviously there a range of areas covered from very high speed machines, that could be used for cooling fans in automotive fuel cells or scaled up for drive motors, to energy management and into various communications aspects of vehicular technology. © 1982-2012 IEEE.

  • 39.
    Engberg, Emelie
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Landerup, Marina
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Riskidentifiering inom elektronisk kommunikation i Hallands län: Vilka hot föreligger den elektroniska kommunikationen och vilka risker innebär det?2014Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [sv]

    Den elektroniska kommunikationen är idag en stor och viktig del i vardagen, därför beslutade sig Länsstyrelsen i Hallands län för att starta ett projekt där de i ett samarbete med Högskolan i Halmstad skulle utföra en fullständig risk- och sårbarhetsanalys inom sektorn elektronisk kommunikation, tillsammans med kommunerna och regionen i Hallands län. Som en första del i en risk- och sårbarhetsanalys, måste en riskidentifiering göras och det är det som är syftet med rapporten. Resultatdelen i rapporten bygger på en sammanställning av svar från intervjuer med anställda inom kommunerna och Region Halland.

    Riskerna som föranletts av de identifierade hoten är relativt många och är av olika form och allvarlighetsgrad. Den vanligaste risken är att system periodvis blir långsamma, ett exempel på detta är att lönesystemet blir långsammare i slutet av månaden då det blir överbelastat för att alla löner ska betalas ut. Genom redundans i systemen reduceras risker som störningar, långsamma system och otillgängliga program och funktioner.

    Mycket ansvar kring säkerheten läggs på IT-avdelningen som många gånger känner att det både saknas ekonomiska medel men också tidsbrist för att upprätthålla en önskvärd säkerhet.

    Slutligen vill vi påstå att hotbildsanalyser och riskidentifieringar är viktiga att utföra för att kunna upprätthålla säkerhet och skydda verksamheten på rätt sätt. 

  • 40.
    Ericsson, Andreas
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Ericsson, Jonas
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Fjärrstyrning av värmepump2013Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Att fjärrstyra sin värmepump gör det möjligt att styra inomhusklimatet även då man inte är hemma. Detta passar mycket bra i exempelvis fritidshus då man enkelt kan höja temperaturen innan man skall dit och därmed kan njuta av ett behagligt inomhusklimat direkt.

    Med dagens fjärrstyrning av Daikins värmepumpar finns två problem. Systemet använder GSM-nätet och användaren måste kunna de olika SMS-koderna utantill. Fjärrstyrning används oftast i fritidshus på landsbygden och 3G-nätet har idag bättre täckning än GSM-nätet på många av dessa platser.

    Målet med examensarbetet är att ta fram ett system som åtgärdar dessa problem.

    Vi börjar med att ta fram en funktionsmodell att utgå från. Går vidare med val av hårdvara för modulen, och därefter vidare till mjukvaruutveckling.

    Resultatet av detta examensarbete är ett system för fjärrstyrning av Daikins värmepumpar som använder 3G-nätet och enkelt kan styras via en androidapplikation.

  • 41.
    Firouzbakhsh, Navid
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Mokhtari Karchegani, Arash
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Internet to WSN configuration and access using 6LoWPAN2014Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The Internet of Things mission is to connect any objects to the Internet, in order to provide the ability to access everything, everywhere. It will enable people to control and monitor their environment in a very convenient way. In order to fulfill the Internet of Things mission, one idea is to wrap a non-IP based protocol stack in the objects equipped with sensors, actuators and computing resources to enable them to be connected to the Internet through a protocol translation gateway. An alternative and competing idea, is to embed the TCP/IP stack into such smart objects, enabling them to interact with the Internet seamlessly. However, in order to satisfy the Internet of Things needs such as scalability, interoperability and simplicity of configuration and management, the use of IP architecture for smart objects is of interest, since it has proven itself a highly scalable, interoperable and simple communication technology. In particular, the new optimized Internet Protocol, IPv6, which is capable of providing any single object with a unique address, accompanied by many other great features such as plug-and-play and a real end-to-end connectivity, can offer great benefits to the Internet of Things. Nevertheless, most of the smart objects specially deployed in Wireless Sensor Networks a subset of Internet of Things, are not able to adapt the large IPv6 packet because of their Link- Layer limitations. Hence, it is a quite challenging task for these devices to transmit an IPv6 packet. For this reason, the Internet Engineering Task Force organization has offered an IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN) solution in order to solve the IPv6 adaptability problem. This thesis presents the design and deployment of an IPv6-based WSN using this solution. The result of this work is building a 6LoWPAN based on the Contiki OS. This WSN is able to send the measured environment temperature to a web server and control the status of a light through the Internet in a standard, scalable, and seamless way.

  • 42.
    Ganjalizadeh, Milad
    et al.
    Halmstad University, School of Information Technology.
    Jonsson, Magnus
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Kunert, Kristina
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Reliability Enhancement for Hard Real-Time Communication in Industrial Packet-Switched Networks2014In: Multiple Access Communications: 7th International Workshop, MACOM 2014, Halmstad, Sweden, August 27-28, 2014. Proceedings / [ed] Magnus Jonsson, Alexey Vinel, Boris Bellalta & Evgeny Belyaev, Cham: Springer, 2014, Vol. 8715, 59-74 p.Conference paper (Refereed)
    Abstract [en]

    Large industrial control and automation applications require reliable communication with strict timing constraints between distributed communication equipment. Packet-switched networks are widely used as a high-speed, deterministic, and low-cost solution to handle these types of distributed real-time systems. Although research on guaranteeing timing requirements in packet-switched networks has been done, communication reliability is still an open problem for hard real-time applications. In this paper, a framework for enhancing the reliability in multihop packet-switched networks is presented. Moreover, an admission control mechanism using a real-time analysis is suggested to provide deadline guarantees for hard real-time traffic. The performance evaluation of the proposed solution shows a possible enhancement of the message error rate by several orders of magnitude while the decrease in network utilization stays at a reasonable level. © Springer International Publishing Switzerland 2014

  • 43.
    Gjercek, Albin
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Andersson, Alexander
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Wireless Security, a practical guide2012Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    Wireless networks are continuing to grow around the world due to the advantages it offers and all the different services that it provides. In networking environments where the communication goes through a wireless connection, the importance of protecting the private information is a very significant task for network administrators. Beside the great benefits from having this type of network, the major issue of wireless communications is the weak security it provides. Companies and business organizations are more and more involved with the use of wireless networks because of the flexibility, mobility and the scalability it offers, but they are also concerned about the consequences of having a weaker security to protect their expensive investments and information. This thesis discusses the issues behind the security of wireless networks. It explains the background of the wireless networks and describes how the different security algorithms and encryptions work. The authors of this thesis decided to present some of the possible attacks that could occur in wireless networks and also give some security solutions to help others protect their network. The group that worked together on this project had the idea of investigating how secure the actual wireless algorithms and encryptions are. The approach of finding the necessary information for presenting the results and conclusions was to perform penetration tests on wireless networks that were implemented with the three famous security algorithms of WEP, WPA and WPA2. The penetrations tests were performed in lab environments and in home networks with the use of cracking tools. The group used the open source Linux based distribution called BackTrack 5. This operating system provided the group the different cracking tools that would help them perform their investigation. The purpose of performing the penetration tests was to find out the vulnerabilities that each of the security algorithms poses and therefore be able to determine which of them offers the best protection to a wireless network. After the penetration tests were done, the group came up with some solutions by configuring a wireless network with the strongest security options. The solutions were aimed to help others how to configure a specific wireless network in a simple but effective way. The results indicated that the weakest security algorithm would present some major issues for a wireless network. It included a greater possibility of experiencing different network attacks by configuring a wireless network with a weak security algorithm. Overall, this thesis provided the group the necessary information that was beneficial for them to understand how strong a wireless network actually is, and how a penetration test was performed.

  • 44.
    Hajji, Maryam
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    A comparative study of Nanowire-based InP and Planar ITO/InP Photodetectors2011Independent thesis Advanced level (degree of Master (One Year)), 15 credits / 22,5 HE creditsStudent thesis
    Abstract [en]

    Photodetectors are a kind of semiconductor devices that convert incoming light to an electrical signal. Photodetectors have different applications in sensors and fiber optic communication systems, and medical diagnosis etc.

    In this project  Fourier Transform Infrared (FTIR) Spectroscopy is used to investigate a new version  of photodiodes for near-infrared radiation that is based on self-assembled semiconductor nanowires (NWs) which are grown directly on the substrate without any epi-layer. The spectrally resolved photocurrent (at different applied biases) and IV curves (in darkness and illumination) for different temperatures have been studied, respectively.

    The thesis work also includes a comparison to a planar photodetector based on Indium Tin Oxide (ITO) deposited directly on an InP substrate.

     

     

  • 45.
    HASSANI, SEYED RASHIDALDIN
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
      QoS management in DSL services of an ISP in Iran2010Independent thesis Advanced level (degree of Master (One Year)), 15 credits / 22,5 HE creditsStudent thesis
    Abstract [en]

    Quality of Service is a set of mechanisms created for differentiating users and data flows. Provisioning the QoS in service provider networks is always interesting for their business departments for they can offer and sell diverse services and to make more money. This thesis QoS for DSL subscribers of Pardis Online - the private ISP in Iran. The size of the network, the certain network connectivity limitations the ISP has in addition to the complexity of the services it provides, necessitate a comprehensive study to elucidate the different service types and requirements and then choosing a specific implementation of QoS in order to meet the ISP’s need. The internet bandwidth in the region that ISP operates is very expensive and the users suffer from the lack of bandwidth so the limited internet links are usually congested in the network. This document concludes with proposing a layered QoS that guarantees that the total bandwidth of an area in congested times is distributed to the users in that area proportionate to the subscribed band width. The resulting proposals are tested in the Lab and their performance under the simulated traffic is monitored and analyzed.

  • 46.
    He, Debiao
    et al.
    Wuhan University, Wuhan, China & the State Key Laboratory of Cryptology, Beijing, China.
    Kumar, Neeraj
    Thapar University, Patiala, India.
    Wang, Huaqun
    Dalian Ocean University, Dalian, China.
    Wang, Lina
    Wuhan University, Wuhan, China.
    Raymond Choo, Kim-Kwang
    University of Texas at San Antonio, San Antonio, Texas, USA; University of South Australia, Adelaide, Australia & China University of Geosciences, Wuhan, China.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network2016In: IEEE Transactions on Dependable and Secure Computing, ISSN 1545-5971, E-ISSN 1941-0018, Vol. 13, no 9Article in journal (Refereed)
    Abstract [en]

    With rapid developments of sensor, wireless and mobile communication technologies, Mobile Healthcare Social Networks (MHSNs) have emerged as a popular means of communication in healthcare services. Within MHSNs, patients can use their mobile devices to securely share their experiences, broaden their understanding of the illness or symptoms, form a supportive network, and transmit information (e.g. state of health and new symptoms) between users and other stake holders (e.g. medical center). Despite the benefits afforded by MHSNs, there are underlying security and privacy issues (e.g. due to the transmission of messages via a wireless channel). The handshake scheme is an important cryptographic mechanism, which can provide secure communication in MHSNs (e.g. anonymity and mutual authentication between users, such as patients). In this paper, we present a new framework for the handshake scheme in MHSNs, which is based on hierarchical identity-based cryptography. We then construct an efficient Cross-Domain HandShake (CDHS) scheme that allows symptoms-matching within MHSNs. For example, using the proposed CDHS scheme, two patients registered with different healthcare centers can achieve mutual authentication and generate a session key for future secure communications. We then prove the security of the scheme, and a comparative summary demonstrates that the proposed CDHS scheme requires fewer computation and lower communication costs. We also implement the proposed CDHS scheme and three related schemes in a proof of concept Android app to demonstrate utility of the scheme. Findings from the evaluations demonstrate that the proposed CDHS scheme achieves a reduction of 18.14% and 5.41% in computation cost and communication cost, in comparison to three other related handshake schemes.

  • 47.
    He, Debiao
    et al.
    Wuhan University, Wuhan, China.
    Kumar, Neeraj
    Thapar University, Patiala, India.
    Zeadally, Sherali
    University of the District of Columbia, Lexington, Kentucky, USA.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Yang, Laurence T.
    St. Francis Xavier University, Antigonish, Canada.
    Efficient and Privacy-Preserving Data Aggregation Scheme for Smart Grid against Internal Adversaries2017In: IEEE Transactions on Smart Grid, ISSN 1949-3053, E-ISSN 1949-3061, Vol. 8, no 5, 2411-2419 p.Article in journal (Refereed)
    Abstract [en]

    Privacy-Preserving Data Aggregation (P2DA) is an important basic building block that can protect consumer’s privacy in the smart grid environment because it could be used to prevent the extraction of the electricity consumption information of a specific consumer. Due to this important function, the P2DA scheme for the smart grid has attracted a lot of attention from both academic and industry researchers who have proposed many P2DA schemes for the smart grid in recent years. However, most of these P2DA schemes are not secure against internal attackers or cannot provide data integrity. Besides, their computation costs are not satisfactory because the bilinear pairing operation or the hash-to-point operation is performed at the smart meter’s side. To address the deficiencies of previous schemes, we propose a new P2DA scheme against internal attackers using Boneh-Goh-Nissim public key cryptography. The proposed P2DA scheme does not use bilinear pairing or hash-to-point operations making it more computationally efficient than previous P2DA schemes. We also show that the proposed P2DA scheme is provably secure and can meet various security requirements. © Copyright 2017 IEEE

  • 48.
    Hilt, Benoit
    et al.
    University of Haute Alsace, Colmar, France.
    Berbineau, MarionIFSTTAR, Villeneuve d’Ascq, France .Vinel, AlexeyHalmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).Pirovano, AlainENAC, Toulouse, France .
    Networking Simulation for Intelligent Transportation Systems: High Mobile Wireless Nodes2017Collection (editor) (Refereed)
    Abstract [en]

    This book studies the simulation of wireless networking in the domain of Intelligent Transportation Systems (ITS) involving aircraft, railway and vehicular communication. On this subject, particular focus is placed on effective communication channels, mobility modeling, multi-technology simulation and global ITS simulation frameworks.

    Networking Simulation for Intelligent Transportation Systems addresses the mixing of IEEE802.11p and LTE into a dedicated simulation environment as well as the links between ITS and IoT; aeronautical mobility and VHD Data Link (VDL) simulation; virtual co-simulation for railway communication and control-command; realistic channel simulation, mobility modeling and autonomic simulation for VANET and quality metrics for VANET.

    The authors intend for this book to be as useful as possible to the reader as they provide examples of methods and tools for running realistic and reliable simulations in the domain of communications for ITS.

  • 49.
    Hoang, Hoai
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Bengtsson, Jerker
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    On supporting real-time communication over the IEEE 802.15.4 protocol2008In: Proceedings of the international conference on wireless information networks and systems (WinSys 2008), Setubal: INSTICC Press, 2008, 82-87 p.Conference paper (Refereed)
    Abstract [en]

    IEEE 802.15.4 is a new enabling technology for low data rate wireless personal networks. This standard was not specifically designed for wireless sensor networks, but it has shown to be a good match with necessary requirements on low data rate, low power consumption and low cost. Unlike the former 802.11 standard, the MAC protocol specified in IEEE 802.15.4 can operate in two different modes: beacon-enabled mode or non-beacon enable mode. In beacon-enabled mode, nodes can exclusively allocate a number of guaranteed time slots, similar to a resource reservation scheme. Hence, the IEEE 802.15.4 MAC protocol have sufficient capabilities for supporting real-time communication. This paper presents the key features of IEEE 802.15.4 which makes it an attractive standard to use for real-time wireless sensor networks. Two real-time protocols extending the IEEE 802.15.4 standard are reviewed. The purpose of this paper is to present the state of the art on real-time support over IEEE 802.15.4 for wireless sensor networks and to discuss the possibilities on improvements on both the standard and the real-time protocols extending the standard.

  • 50.
    Hoang, Le-Nam
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Relaying for Timely and Reliable Message Dissemination in Wireless Distributed Control Systems2015Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    Distributed control applications enabled by wireless networks are becoming more and more frequent. The advantages of wireless access are many, as control systems become mobile, autonomous and connected. Examples include platooning and automated factories. However, distributed control systems have stringent requirement on both reliability and timeliness, the latter in terms of deadlines. If the deadline is missed, the packet is considered useless, similarly to a lost or erroneous packet in a system without deadlines. In addition, wireless channels are, by nature, more exposed to noise and interference than their wired counterparts. Consequently, it implies a considerable challenge to fulfill the deadline requirements with sufficient reliability for proper functionality of distributed control applications. However, by taking advantage of cooperative communications, increased reliability can be achieved with little or no additional delay.

    Reducing the delay until a message is successfully received is a two-fold problem: providing channel access with a predictable maximum delay and maximizing the reliability of each transmission, once granted by the medium access method. To this end, this thesis proposes a framework that provides a bounded channel access delay and handles the co-existence of both time-triggered and event-driven messages encountered in distributed control applications. In addition, the thesis proposes and evaluates an efficient message dissemination technique based on relaying that maximizes the reliability given a certain deadline, or alternatively determines the delay required to achieve a certain reliability threshold for both unicast and broadcast scenarios. Numerical results, which are verified by Monte-Carlo simulations, show significant improvements with the proposed relaying scheme as compared to a conventional scheme without cooperation, providing more reliable message delivery given a fixed number of available time-slots. It also becomes clear in which situations relaying is preferable and in which situations pure retransmissions are preferable, as the relay selection algorithm will always pick the best option. The relay selection algorithm has a reasonable complexity and can be used by both routing algorithms and relaying scenarios in any time-critical application as long as it is used together with a framework that enables predictable channel access. In addition, it can be implemented on top of commercially available transceivers.

1234 1 - 50 of 157
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf