16 results on '"Vojislav B. Misic"'
Search Results
2. Improving Dual-UAV Aided Ground-UAV Bi-Directional Communication Security: Joint UAV Trajectory and Transmit Power Optimization
- Author
-
Hongyue Kang, Xiaolin Chang, Jelena Misic, Vojislav B. Misic, Junchao Fan, and Jing Bai
- Subjects
Computer Networks and Communications ,Automotive Engineering ,Aerospace Engineering ,Electrical and Electronic Engineering - Published
- 2022
- Full Text
- View/download PDF
3. Optimal Multi-Tier Clustering of Permissioned Blockchain Systems for IoT
- Author
-
Jelena Misic, Vojislav B. Misic, and Xiaolin Chang
- Subjects
Computer Networks and Communications ,Automotive Engineering ,Aerospace Engineering ,Electrical and Electronic Engineering - Published
- 2022
- Full Text
- View/download PDF
4. Adapting PBFT for Use With Blockchain-Enabled IoT Systems
- Author
-
Xiaolin Chang, Vojislav B. Misic, Haytham Qushtom, and Jelena Misic
- Subjects
Atomicity ,Computer Networks and Communications ,business.industry ,Computer science ,Node (networking) ,Aerospace Engineering ,020302 automobile design & engineering ,Throughput ,02 engineering and technology ,0203 mechanical engineering ,Server ,Automotive Engineering ,Electrical and Electronic Engineering ,business ,Queue ,Byzantine fault tolerance ,Access time ,Computer network ,Block (data storage) - Abstract
This work proposes Practical Byzantine Fault Tolerance (PBFT) ordering service needed for block formation in permissioned blockchain environments. Contrary to current PBFT implementations that only provide a single point of entry to the ordering service, we allow each ordering node to act as an entry point that proposes and conducts the consensus process of including new record in the distributed ledger. To ensure atomicity of record insertion in distributed ledger, we have developed a bandwidth reservation protocol that uses a modification of CSMA/CA protocol to regulate access to the broadcast medium formed by the P2P network of TCP connections between orderers. We have modeled record insertion service time in a cluster where ordering nodes have random position within Cartesian coordinate system. We have also modeled total request access time to the ledger which includes waiting time in the orderer's queue and record insertion time. These models are used to evaluate system performance under variable request rate ordering service, variable number of nodes and variable physical cluster dimensions. Our results show the interaction between decreased request waiting time in orderer's queue and increased contention among orderers when the number of orderers increases for the given total request arrival rate. This interaction is also investigated for two different physical cluster sizes which affect record insertion time. The interplay of request rate, number of orderers and physical cluster size determines system capacity expressed in total request rate. Our model can be used to make the trade-off between the required system capacity, number of orderers, and physical cluster dimensions under constraints on Byzantine fault rate.
- Published
- 2021
- Full Text
- View/download PDF
5. Lightweight and Privacy-Preserving ID-as-a-Service Provisioning in Vehicular Cloud Computing
- Author
-
Xiaolin Chang, Jelena Misic, Yingying Yao, and Vojislav B. Misic
- Subjects
Information privacy ,Computer Networks and Communications ,business.industry ,Computer science ,Aerospace Engineering ,020302 automobile design & engineering ,Access control ,Cloud computing ,02 engineering and technology ,Encryption ,0203 mechanical engineering ,Forward secrecy ,Automotive Engineering ,Attribute-based encryption ,Electrical and Electronic Engineering ,business ,Personally identifiable information ,Computer network - Abstract
Vehicular cloud computing (VCC) is composed of multiple distributed vehicular clouds (VCs), which are formed on-the-fly by dynamically integrating underutilized vehicular resources including computing power, storage, and so on. Existing proposals for identity-as-a-service (IDaaS) are not suitable for use in VCC due to limited computing resources and storage capacity of onboard vehicle devices. In this paper, we first propose an improved ciphertext-policy attribute-based encryption (CP-ABE) scheme. Utilizing the improved CP-ABE scheme and the permissioned blockchain technology, we propose a lightweight and privacy-preserving IDaaS architecture for VCC named IDaaSoVCC. It realizes lightweight and privacy-preserving access control of vehicles’ personally identifiable information (PII) in a large distributed vehicular cloud system. Security analysis demonstrates the security features of IDaaSoVCC, most notably forward secrecy, confidentiality and identity information privacy. Meanwhile, we verify that IDaaSoVCC is feasible and practical in a large distributed VC system through extensive simulations.
- Published
- 2020
- Full Text
- View/download PDF
6. Formation of Cognitive Personal Area Networks (CPANs) Using Probabilistic Rendezvous
- Author
-
Vojislav B. Misic, Jelena Misic, and Md. Mizanur Rahman
- Subjects
0301 basic medicine ,Computer Networks and Communications ,Computer science ,business.industry ,Node (networking) ,Process (computing) ,Probabilistic logic ,Rendezvous ,Aerospace Engineering ,03 medical and health sciences ,030104 developmental biology ,Automotive Engineering ,Limit (mathematics) ,Electrical and Electronic Engineering ,business ,Computer network - Abstract
The formation of cognitive personal area networks (CPANs) requires a number of nodes to connect to a dedicated coordinator node. In this paper, we propose a probabilistic blind rendezvous protocol that allows nodes to concurrently rendezvous with the CPAN coordinator. This protocol allows nodes to arrive independently and their rendezvous times to overlap partially or fully with one another. We then develop a probabilistic model of the rendezvous process for both a single node and a group of nodes. The model shows that the rendezvous time, in both cases, exhibits hyperexponential behavior with large coefficient of skewness and, consequently, large variability, which may be approximated with a Gamma distribution. Furthermore, the mean group joining time tends to flatten and may even converge to a finite limit when the number of nodes is sufficiently high. However, the variability remains high due to a long tail of the distribution.
- Published
- 2018
- Full Text
- View/download PDF
7. Efficiency of Power Ramping During Random Access in LTE
- Author
-
Jelena Misic and Vojislav B. Misic
- Subjects
Computer Networks and Communications ,Computer science ,business.industry ,Retransmission ,05 social sciences ,Aerospace Engineering ,050801 communication & media studies ,Term (time) ,Power (physics) ,0508 media and communications ,Control channel ,0502 economics and business ,Automotive Engineering ,Telecommunications link ,050211 marketing ,Electrical and Electronic Engineering ,business ,Random access ,Computer network - Abstract
In this paper, we examine the impact of power ramping, number of retransmission attempts, and limitations of the physical downlink control channel (PDCCH) on the performance of random access in Long Term Evolution/Long Term Evolution-Advanced networks. We demonstrate that positive feedback exists between the maximum number of retransmissions, age-based power ramping, and PDCCH deficiency. As the result, system capacity is decreased and performance deteriorates abruptly under moderate to high traffic intensity. We show that, under power ramping and default PDCCH capacity, increasing the number of retransmissions beyond 1 or at most 2 does not bring any benefits and, in fact, is detrimental to system capacity. Increasing PDCCH capacity would enable the benefits of power ramping and allow more retransmission attempts. However, increasing the number of retransmissions combined with power ramping, while helpful under moderate to high load, will decrease system capacity.
- Published
- 2018
- Full Text
- View/download PDF
8. Performance Analysis of Downlink MU-TXOP Sharing in IEEE 802.11ac
- Author
-
M. Zulfiker Ali, Vojislav B. Misic, and Jelena Misic
- Subjects
Computer Networks and Communications ,Computer science ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Real-time computing ,MIMO ,Aerospace Engineering ,020206 networking & telecommunications ,020302 automobile design & engineering ,Throughput ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Channel capacity ,0203 mechanical engineering ,Transmission (telecommunications) ,IEEE 802.11ac ,Automotive Engineering ,Telecommunications link ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,business ,Communication channel ,Computer network - Abstract
The 802.11ac version of the popular IEEE 802.11 protocol aims to boost performance by increasing the channel bandwidth and allowing downlink multiuser multiple-input multiple-output (MIMO)—i.e., simultaneous transmission to multiple clients in the downlink direction. In this paper, we evaluate the performance improvements of multiuser Transmission Opportunity (MU-TXOP) sharing in this scenario under nonsaturated load and non-ideal channel condition, using a novel analytical model based on discrete Markov chain and E-limited M/G/1 queuing model. Our results show that MU-TXOP sharing achieves up to 105% gain in throughput compared to the case without MU-TXOP sharing. Moreover, the low-priority traffic benefits most from MU-TXOP sharing, with up to 150% throughput gain at low traffic intensity due to availability of additional transmission opportunities for secondary ACs.
- Published
- 2017
- Full Text
- View/download PDF
9. Zoning and Relaying-Based MAC Protocol With RF Recharging
- Author
-
Mohammad Shahnoor Islam Khan, Jelena Misic, and Vojislav B. Misic
- Subjects
Queueing theory ,Engineering ,Computer Networks and Communications ,business.industry ,Node (networking) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Aerospace Engineering ,020206 networking & telecommunications ,02 engineering and technology ,Packet switching ,Hardware_GENERAL ,Sensor node ,Automotive Engineering ,Computer Science::Networking and Internet Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Bandwidth (computing) ,020201 artificial intelligence & image processing ,Electrical and Electronic Engineering ,Polling ,business ,Wireless sensor network ,Computer network ,Data transmission - Abstract
Radio-frequency (RF) recharging can extend maintenance-free operation of wireless sensor networks. However, the period between recharging is limited by the distance between the most distant sensor node and the master, which sends out recharging pulses. To increase this period, we propose a zoning scheme in which nodes are logically grouped into circular zones centered at the master so that nodes in a given zone send their data to their neighbors in the next closer zone, which act as relays. We describe and analyze a polling Medium Access Control (MAC) protocol that supports zoning and relaying through a probabilistic model of the energy depletion process and a queueing model of the packet transmission process. Our results indicate that zoning extends the time interval between recharge pulses and leads to equalization of node lifetimes, but limits the available data transmission bandwidth as well.
- Published
- 2017
- Full Text
- View/download PDF
10. Bridge Performance in Asynchronous Cognitive Personal Area Networks
- Author
-
Vojislav B. Misic, Md. Mizanur Rahman, and Jelena Misic
- Subjects
Routing protocol ,Queueing theory ,Bridging (networking) ,Computer Networks and Communications ,Network packet ,Computer science ,business.industry ,Distributed computing ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Aerospace Engineering ,020206 networking & telecommunications ,020302 automobile design & engineering ,02 engineering and technology ,Cognitive network ,Packet switching ,Cognitive radio ,0203 mechanical engineering ,Asynchronous communication ,Automotive Engineering ,0202 electrical engineering, electronic engineering, information engineering ,Network performance ,Electrical and Electronic Engineering ,business ,Computer network - Abstract
Bridging between two cognitive personal area networks (CPANs) is a fundamental step toward a reliable and efficient routing protocol. In this paper, we describe a bridging protocol for two-hop cognitive networks that use the transmission tax-based medium access control and propose ways to prioritize bridge traffic over that of ordinary nodes in both CPANs. We develop an analytical model based on probabilistic modeling and queueing theory to evaluate the performance of the bridging protocol. We validate the network performance by analyzing the waiting time of local and nonlocal packets and how the node or bridge transmission is affected by the collision with primary-source activity. Our results provide insights into the impact of various traffic and network parameters on the performance of two-hop bridging. The results indicate that the proposed protocol is effective and efficient when the bridge transfers a moderate amount of traffic.
- Published
- 2016
- Full Text
- View/download PDF
11. Recovery in Channel-Hopping Cognitive Networks Under Random Primary-User Activity
- Author
-
Vojislav B. Misic and Jelena Misic
- Subjects
Channel allocation schemes ,Computer Networks and Communications ,Computer science ,business.industry ,Aerospace Engineering ,Cognitive network ,Synchronization ,Cognitive radio ,Backup ,Automotive Engineering ,Data_FILES ,Probabilistic analysis of algorithms ,Electrical and Electronic Engineering ,business ,Communication channel ,Computer network - Abstract
We investigate the performance of a recovery mechanism in channel-hopping cognitive networks. The recovery algorithm is based on a list of backup channels to be used as alternatives if primary-user activity interrupts ongoing communication on the current channel; if all backup channels are exhausted without success, the nodes revert to a blind-rendezvous mechanism. We evaluate the performance of the recovery algorithm using the tools of probabilistic analysis and renewal theory and validate the results through simulation. We discuss the impact of various network and channel parameters on the performance of the recovery algorithm and show the importance of accurate sensing information for successful recovery.
- Published
- 2014
- Full Text
- View/download PDF
12. Performance Characterization for IEEE 802.11p Network With Single Channel Devices
- Author
-
Ghada Badawy, Vojislav B. Misic, and Jelena Misic
- Subjects
Engineering ,Exponential backoff ,Computer Networks and Communications ,business.industry ,Frame (networking) ,Aerospace Engineering ,Synchronization ,Control channel ,Automotive Engineering ,Probability distribution ,IEEE 802.11p ,Electrical and Electronic Engineering ,business ,Carrier sense multiple access with collision avoidance ,Computer network ,Communication channel - Abstract
In this paper, we investigate the performance of networks built from single-channel devices that use wireless access in vehicular environment protocols. We consider several traffic combinations, each of which presents a mix of traffic classes, over control and service channels. Our results show that time switching between the channels causes synchronization of backoff processes, which increases the frame collision probability, in particular for small sizes of contention windows. We also evaluate the impact of the interruption of the backoff process by inactive channel time, which gives rise to a probability distribution with repeated tails and a coefficient of variation larger than 1. Our model can also be used to evaluate different sets of enhanced distributed channel access parameters and to select the channel duty cycle according to the policy of the network operator.
- Published
- 2011
- Full Text
- View/download PDF
13. Performance of Cooperative Sensing at the MAC Level: Error Minimization Through Differential Sensing
- Author
-
Vojislav B. Misic and Jelena Misic
- Subjects
Computer Networks and Communications ,Computer science ,business.industry ,Real-time computing ,Physical layer ,Aerospace Engineering ,law.invention ,Spread spectrum ,Bluetooth ,Cognitive radio ,law ,Automotive Engineering ,Wireless lan ,Frequency-hopping spread spectrum ,Minification ,Electrical and Electronic Engineering ,business ,Wireless sensor network ,Communication channel ,Computer network - Abstract
Efficient operation of cognitive personal area networks (CPANs) necessitates accurate and efficient sensing of the primary user activity. This is accomplished in a cooperative manner by a number of nodes in the CPAN; the results of sensing are combined by the CPAN coordinator to form a comprehensive and timely channel map. The error of the sensing process is affected by various factors, including the ratio of the number of sensing nodes to the number of channels. In this paper, we present a probabilistic model of the sensing process and derive an analytical solution for the minimum number of sensing nodes that keeps the sensing error below prescribed limits. Then, we discuss three differential sensing policies in which separate sets of sensing nodes target idle and active channels only and show that the policy in which idle channels are given priority, but not exclusive treatment, achieves the best performance, as measured by the number of channels for which the information in the channel map is erroneous and the mean duration of that erroneous information.
- Published
- 2009
- Full Text
- View/download PDF
14. Maintaining Reliability Through Activity Management in an 802.15.4 Sensor Cluster
- Author
-
S. Shafi, Jelena Misic, and Vojislav B. Misic
- Subjects
Engineering ,Computer Networks and Communications ,business.industry ,Energy management ,Quality of service ,Real-time computing ,Probabilistic logic ,Physical layer ,Aerospace Engineering ,Access control ,Reliability (semiconductor) ,Sensor array ,Automotive Engineering ,Electrical and Electronic Engineering ,business ,Wireless sensor network ,Computer network - Abstract
Different ways to simultaneously control event sensing reliability and device utilization in a beacon-enabled IEEE 802.15.4 sensor cluster are investigated. Activity management is achieved through probabilistic control of the duration of active and inactive (i.e., service and sleep) periods. The probabilistic control parameters are derived as functions of the required event sensing reliability, device utilization, medium access control and physical layer parameters, and network size
- Published
- 2006
- Full Text
- View/download PDF
15. Admission Control in Bluetooth Piconets
- Author
-
Kalok Chan, Jelena Misic, and Vojislav B. Misic
- Subjects
Queueing theory ,Computer Networks and Communications ,Computer science ,business.industry ,Network packet ,End-to-end delay ,Real-time computing ,Aerospace Engineering ,Admission control ,Scheduling (computing) ,law.invention ,Bluetooth ,Piconet ,law ,Automotive Engineering ,Computer Science::Networking and Internet Architecture ,Electrical and Electronic Engineering ,business ,Queue ,Computer network - Abstract
We analyze the performance of E-limited scheduling in Bluetooth piconets under bursty traffic for infinite and finite buffer cases. We show that E-limited service outperforms exhaustive service in terms of end-to-end delay and that the delays may be minimized through the proper choice of a single variable parameter: the number of packets to be exchanged during a single visit to a slave. Using analytical results for access delay and end-to-end delay, as well as suitable approximations thereof, we propose three novel admission algorithms. The simplest algorithm is based on queue stability, which makes it suitable for battery power-limited masters. The second algorithm estimates the access delay of the slave upon admission using the estimated first and second moments of the vacation times and makes the admission decision on the basis of predefined access delay bounds. The third algorithm is based on the predefined cycle time bounds, which makes it suitable for applications that generate constant-bit-rate data flows. We also present results for the performance of TCP traffic under E-limited scheduling.
- Published
- 2004
- Full Text
- View/download PDF
16. Sharing It My Way: Efficient M2M Access in LTE/LTE-A Networks
- Author
-
Nargis Khan, Vojislav B. Misic, and Jelena Misic
- Subjects
Engineering ,Computer Networks and Communications ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Aerospace Engineering ,Overlay network ,020206 networking & telecommunications ,020302 automobile design & engineering ,02 engineering and technology ,Access stratum ,LTE Advanced ,0203 mechanical engineering ,Random-access channel ,Automotive Engineering ,0202 electrical engineering, electronic engineering, information engineering ,Cellular network ,Channel access method ,Electrical and Electronic Engineering ,business ,Carrier sense multiple access with collision avoidance ,Random access ,Computer network - Abstract
When a large number of machine-to-machine (M2M) terminals attempt to access the Long-Term Evolution (LTE)/LTE Advanced (LTE-A) cellular network using the physical random access channel (PRACH), congestion and overload may result, which can lead to serious degradation of performance for both M2M and human-to-human (H2H) terminals. The main cause for this is the inherent complexity of the four-way handshake used for random access, which is well suited for H2H terminal access but unsuitable for massive M2M access. In this paper, we describe an efficient scheme for concurrent M2M and H2H access on the PRACH, which separates the resources for M2M and H2H access at the level of preamble codes and avoids the use of the four-step handshake for M2M terminals by implementing a carrier sense multiple access with collision avoidance (CSMA/CA) overlay network using the designated preamble codes. We analyze the performance of the scheme for both H2H and M2M traffic and show the values of the most important design parameters that enable this scheme to support concurrent access by H2H and M2M terminals with little performance degradation.
- Published
- 2016
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.