Microsoft Word - Novel M2M communication scheme for the Internet of Things_doube_column_20160115_Final
نویسنده
چکیده
Internet of things (IoT) is a new paradigm where almost every physical object will be furnished with sensing, communication and processing capabilities that allow them to communicate with other devices possibly via the internet and/or telecommunication networks. Machine to machine (M2M) communication, which is a key enabling technology for the IoT, enables networked devices to exchange information among themselves with minor or no human involvement. In this paper, we propose a novel coding strategy that considerably increases the efficiency of the channel in the multicast setting. Specifically, we consider the scenario where three M2M communication devices that are close by and want to exchange their messages via a low cost relay or another device in proximity. The main advantage of the proposed scheme is twofold: 1) use of joint channel and physical layer network coding where M2M communication devices simultaneously transmit their messages, 2) no decoding at the relay where relaying can be as simple as amplify and forward or de-noise and forward. Simulation results using practical Raptor codes show that the proposed scheme achieves a near optimal sum rate performance. Furthermore, we propose an efficiently scalable technique for disseminating information among a large number of M2M communication devices.
منابع مشابه
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملMicrosoft Word - IMECS2011_Draft_Guo_and_Yu_fixed_20101229_2
In current mobile telecommunications systems, the security offered by these networks are limited. In order to be used in use cases that require a high degree of security, such as M2M (financial, voting system), more security guarantees are necessary. Therefore, additional security must be added on top of existing networks. A common way to add security is by the use of composite encryption schem...
متن کاملCooperative Architecture for Secure M2M Communication in Distributed Sensor Networking
Machine to machine (M2M) technology has emerged as a rapidly developing technology for large-scale networking of devices without dependence on human interaction. The new form of machine interconnectivity integrates with cloud computing infrastructure through the Internet however, M2M communication poses unique security challenges as the Internet grow steadily and rapidly. The large number conne...
متن کاملA Novel Trust Management Model in the Social Internet of Things
The Internet of Things (IoT) and social networking integration, create a new concept named Social Internet of Things (SIoT) according to which the things are able to autonomously establish social relationships with regard to the owners. Things in SIoT operate according to a service-oriented architecture. There may be misbehaving owners and consequently misbehaving devices that can perform harmf...
متن کاملEvaluation of the Microsoft office familiarity of the medical students of Hormozgan Medical University in 2006
The ability to access, evaluate and use information in each profession is one of the most effective materials of individual success. Accessing updated medical information is vital for physicians (1-5). In a descriptive cross sectional study performed in Bandar Abbas, the capital city of Hormozgan province in the southern part of Iran. Data the internet and computer usage was examined among m...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016