[go: up one dir, main page]

Peruzzo et al., 2018 - Google Patents

A power efficient adaptive data rate algorithm for LoRaWAN networks

Peruzzo et al., 2018

Document ID
12274377819745592095
Author
Peruzzo A
Vangelista L
Publication year
Publication venue
2018 21st international symposium on wireless personal multimedia communications (WPMC)

External Links

Snippet

LoRaWAN networks have recently started to play a key role in the framework of Low Power Wide Area Network (LPWAN) for Internet of Things. In Internet of Things a crucial aspect is the reduction of energy consumption and in LPWAN, where there is a huge number of …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; Arrangements for supplying electrical power along data transmission lines
    • H04L25/03Shaping networks in transmitter or receiver, e.g. adaptive shaping networks ; Receiver end arrangements for processing baseband signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W28/00Network traffic or resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W28/00Network traffic or resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]

Similar Documents

Publication Publication Date Title
Peruzzo et al. A power efficient adaptive data rate algorithm for LoRaWAN networks
CN111245539A (en) An efficient resource allocation method for mobile edge computing network based on NOMA
James IoT cybersecurity based smart home intrusion prevention system
Kadhim 5G and next generation networks
Zhang et al. Deep neural network based channel allocation for interference-limited wireless networks
Li et al. Convolutional neural network-based split prediction for VVC intra speedup
Gupta et al. Security Enhancement Using Quantum Cryptography in WSN
Urosevic et al. BER performances of virtual QOSTBC in P2P communications under imperfect channel estimation
Garnepudi et al. Sum secrecy rate maximization for control jamming assisted star-ris wireless network
Kim Ultra‐Reliable and Low Latency Communication Systems
Shukri et al. Evaluating the Energy Efficiency of NOMA 5G with Regard to the Capacity and Coverage
Cui et al. Quota Matching-based Task Offloading for WSN in Smart Grid
Saeed Cognitive Radio and advanced spectrum management
Kodavati et al. Latency based Re-Enforcement Learning over Cognitive Software Defined 5G Networks
Zhang et al. Analysis of the use cases and technical enhancements of TSN
Sendin et al. Wireless IoT technologies
Jain et al. Rateless Code-Aided Transmission Scheme to Achieve Secrecy in a Delay-Constraint Environment
Tolba et al. Securing Task Computation Offloading for Mobile Edge Computing in Untrusted Relay Networks
Janardhanan Silicon Technologies for Next Generation 5G Architectures and Applications
Srivastava et al. Communication Performance and Factors that Affect It
Zhou et al. A Federated Learning and DQN based Cooperative Resource Allocation Algorithm for Multi-Service MEC Networks
Sheikh et al. An Energy-Efficient Approach for the Security of IoT Networks using SCEER
Huang et al. Mobile User Pairing Scheme in NOMA-Enabled Backscatter Communication Networks
Ochiai et al. Adaptive step size control for update of activation probability in online probabilistic BS activation control method
Allah Gholi Ghasri et al. A Generalized Framework for Joint Dynamic Optimal RF Interface Setting and Next-Hop Selection in IoT networks with Similar Requests