Abstract:Trace‐driven simulations supported by long‐term and human‐based indoor mobility traces are able to properly validate the effectiveness and efficiency of the algorithms, protocols or applications utilized in indoor wireless networks. Nevertheless, most of the mobility models adopted in the existing works are simplified variations of random waypoint (RWP) model. To evaluate the feasibility of RWP model, we extract the real‐time mobility trace of a one‐month period human‐based raw dataset and quantitatively compa… Show more
“…Also, the number of users, randomly moving inside the available areas, varies from 10 to 100. To simulate people movement inside, we adopted a custom version of a common mobility model typical of these scenarios, namely the Random Waypoint Mobility Model [72]. It generates shifts according to the following strategy.…”
Video surveillance of public spaces is a feature of modern society that has expanded quite quickly and in a pervasive way during the last decades becoming a fundamental need for both individual and collective security. But, as the sophistication of this type of systems increases, the concern about threat to individuals' right of privacy raises as well. Indeed, the video surveillance systems could breach personal privacy because location is clearly one of the most sensitive people information. Hence, preserving location privacy while achieving utility from it, is a challenging problem demanding the investigation of researchers. This paper tackles this non-trivial issue by designing a novel privacy-preserving architecture able to anonymously monitoring people access at the entrance of critical areas in an indoor space. At the same time our approach is able to provide full accountability in case of an accident or a legal requirement. Interestingly, our protocol is robust to server-side attacks and is efficient enough to be applied indoors through a set of IoT (Internet of Things) smart camera devices.
“…Also, the number of users, randomly moving inside the available areas, varies from 10 to 100. To simulate people movement inside, we adopted a custom version of a common mobility model typical of these scenarios, namely the Random Waypoint Mobility Model [72]. It generates shifts according to the following strategy.…”
Video surveillance of public spaces is a feature of modern society that has expanded quite quickly and in a pervasive way during the last decades becoming a fundamental need for both individual and collective security. But, as the sophistication of this type of systems increases, the concern about threat to individuals' right of privacy raises as well. Indeed, the video surveillance systems could breach personal privacy because location is clearly one of the most sensitive people information. Hence, preserving location privacy while achieving utility from it, is a challenging problem demanding the investigation of researchers. This paper tackles this non-trivial issue by designing a novel privacy-preserving architecture able to anonymously monitoring people access at the entrance of critical areas in an indoor space. At the same time our approach is able to provide full accountability in case of an accident or a legal requirement. Interestingly, our protocol is robust to server-side attacks and is efficient enough to be applied indoors through a set of IoT (Internet of Things) smart camera devices.
Even a wider set of highly critical and latencysensitive applications with resource needs from the access network and the edge will be supported by the 6G networks. Therefore, the 6G network will deal with diversification of service platforms. Optimizing the resource consumption of network slicing on top of a shared infrastructure will become essential to keep the operating costs on an acceptable level. Each vertical, e.g., eMBBPlus, BigCom, holographic and tactile communications can run on top of network slice with specific KPIs. Different verticals can have contradicting requirements running on top of the same infrastructure. This paper investigates the orchestration of network services within a federated end-to-end network slice, which may span over multiple cloud domains as expected to be a common scenario in 6G deployments. We introduce three optimization solutions that consider two conflicting objectives, the end-to-end delay and service relocation, for orchestrating network slice. While the first solution optimizes the end-toend delay, the second solution optimizes the service relocation. Meanwhile, the third solution leverages the bargaining game theory for achieving optimal Pareto fair trade-off configuration to optimize both objectives. The simulation results demonstrate the efficiency of the proposed solutions to achieve their main design goals
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.