摘要:
A mechanism is provided for establishing a shared secret-key for secure communication between nodes in a wireless network. A first node in the wireless network provides a spreading code to a second node of the wireless network. The second node provides a first input for the key establishment to the first node using communication encoded with the spreading code. Responsive to obtaining the first input from the second node, the first node provides a second input for the key establishment to the second node using communication encoded with the spreading code. Then, the first node and the second node establish the shared secret-key using the first input and the second input.
摘要:
Spectrum access for Internet of things (IOT) applications including receiving information about expected use by a primary user of a spectrum band in a radio frequency spectrum. The spectrum band is classified into at least two working modes based on the expected use. The spectrum band is sensed to determine a current access pattern of the primary user. Based on the classifying and the sensing, one of the working modes is selected as a current working mode of the primary user. Transmissions are scheduled on the spectrum band using a current schedule that is responsive to the current working mode of the primary user. If the current working mode of the primary user changes, the sensing, selecting, scheduling, and determining whether the current working mode has changed are re-performed. Otherwise, the transmission scheduling and determining if the current working mode has changed are re-performed.
摘要:
Network management data is managed by determining that a first version and a second version of a set of network management data have been created. The set of network management data is associated with a plurality of managed entities in a network. First and second network graphs are created based on the first version and second version of the set of network management data, respectively. The first and second network graphs include a first and second set of entities in the plurality of managed entities, respectively. A similarity metric is assigned between at least one or more entities in the first and second set of entities. At least a first entity in the first set of entities and at least a second entity in the second set of entities are determined to be identical entities based on the similarity metric being one of equal to and above a first given threshold.
摘要:
A method of transmitting a query in a wireless network includes receiving a plurality of queries from a plurality of user equipments, aggregating the plurality of queries at a node of the network, the network including at least one of an access point of the network and an intermediate node of the network, and transmitting the aggregated plurality of queries to a query server.
摘要:
A system and method for adaptive remote decision making includes steps of: receiving from an application layer a target range for a level of reporting quality for processed data; setting data collection parameters to meet the target range; collecting the data from a plurality of remote data collecting devices deployed in the distributed computing system, a portion of said data being compromised during the collecting process; processing the collected data to produce the processed data; evaluating the processed data based on observable metrics of current collected data and reported data losses; forecasting an expected reporting quality while continuing to collect the data; comparing the expected reporting quality with the target range; and reporting the processed data when the expected reporting quality falls within the target range for the level of reporting quality.
摘要:
An aspect of this invention is a method that includes a computing apparatus estimating geographic locations as a function of time for each of a plurality of sensor nodes. The method further includes estimating a quality of information as a function of time for sensed data to be sensed by the plurality of sensor nodes at the estimated geographic locations; and sending the estimated quality of information as a function of time to one or more applications or consumers of the sensed data.
摘要:
Techniques for configuring a wireless network cloud system comprise the following steps. A density metric is estimated corresponding to at least one given coverage area of a wireless network cloud system. A configuration is determined for one or more network-access components in the given coverage area of the wireless network cloud system in response to the estimated density metric. The determined configuration may then be applied to the one or more network-access components. The density metric may correspond to a user density and/or a traffic density in the given coverage area.
摘要:
Techniques for configuring a wireless network cloud system comprise the following steps. A density metric is estimated corresponding to at least one given coverage area of a wireless network cloud system. A configuration is determined for one or more network-access components in the given coverage area of the wireless network cloud system in response to the estimated density metric. The determined configuration may then be applied to the one or more network-access components. The density metric may correspond to a user density and/or a traffic density in the given coverage area.
摘要:
An aspect of this invention is a method that includes a computing apparatus estimating geographic locations as a function of time for each of a plurality of sensor nodes. The method further includes estimating a quality of information as a function of time for sensed data to be sensed by the plurality of sensor nodes at the estimated geographic locations; and sending the estimated quality of information as a function of time to one or more applications or consumers of the sensed data.
摘要:
A mechanism is provided for establishing a shared secret-key for secure communication between nodes in a wireless network. A first node in the wireless network provides a spreading code to a second node of the wireless network. The second node provides a first input for the key establishment to the first node using communication encoded with the spreading code. Responsive to obtaining the first input from the second node, the first node provides a second input for the key establishment to the second node using communication encoded with the spreading code. Then, the first node and the second node establish the shared secret-key using the first input and the second input.