The rapid population growth in large urban cities has led to an unprecedented increase in both the number and the diversity of wireless devices and applications with varying quality of service requirements in terms of latency and data rates. LinkNYC is an example of an urban communication network infrastructure, which...
In recent years, RF (Radio Frequency) device fingerprinting using deep learning has emerged as a method of identifying devices solely by their RF transmissions. Conventional approaches to this type of device fingerprinting are not portable to different domains. That is, if a model for this purpose is trained on data...
Software Defined Network (SDN) is a new networking concept in which the data plane is decoupled from the control plane. Due to the huge demand on network resources and the rapidly increasing numbers of devices needing to be connected to the network, SDN paradigm has emerged as a potential solution...
Data centers (DCs) have been witnessing unprecedented growth in size, number and complexity in recent years. They consist of tens of thousands of servers interconnected by fast network switches, hosting and enabling numerous applications with various traffic characteristics and requirements. As a result, DC networks have been presented with several...
The increased use of mobile wireless devices that we have recently been witnessing, such as smartphones, tablets, e-readers, and WiFi enabled devices in general, is driving an unprecedented increase in the amount of data traffic. This fast market adoption of the wireless technology along with the tremendous success of multimedia...
The proliferation of mobile users and internet content has advanced a plethora of research areas. Among these areas include mobile networks, transport layer protocols, and smart cities. Research shows that global mobile data traffic will increase sevenfold reaching 49 exabytes per month by 2021, most of which will be mobile...
The enormous success of wireless technology has recently led to an explosive demand for, and hence a shortage of, bandwidth resources. This expected shortage problem is reported to be primarily due to the inefficient, static nature of current spectrum allocation methods. As an initial step towards solving this shortage problem,...
Routing from a single source node to multiple destination nodes using node disjoint paths (NDP) has many important applications in parallel systems. For example, if a source node wants to send distinct messages to distinct destination nodes, then the one-to-many NDP routing is useful.
Unlike parallel systems with shared-memory, each...
RF data-driven device fingerprinting through the use of deep learning has recently surfaced as a possible method for secure device identification and authentication. Traditional approaches are commonly susceptible to the domain adaptation problem where a model trained on data from one domain performs badly when tested on data from a...
IoT networks can be viewed as collections of Internet-enabled physical devices and objects, embedded with sensor, actuator, computation, storage and communication components, that are capable of connecting and exchanging data to one another. In recent years, organizations have allowed more and more IoT devices to be connected to their networks,...
In this paper, we propose a credit-based resource allocation technique for dynamic spectrum access (DSA) systems that is robust against malicious and selfi sh behaviors and ensures good overall system fairness performance while also allowing spectrum users to achieve high amounts of service. We also propose a new objective function...
The scarcity of wireless spectrum resources and the overwhelming demand for wireless broadband resources have prompted industry, government agencies and academia within the wireless communities to develop and come up with effective solutions that can make additional spectrum available for broadband data. As part of these ongoing efforts, cognitive radio...
Cognitive Radio Networks (CRNs) enable opportunistic access to the licensed channel resources by allowing unlicensed users to exploit vacant channel opportunities. One effective technique through which unlicensed users, often referred to as Secondary Users (SUs), acquire whether a channel is vacant is cooperative spectrum sensing. Despite its effectiveness in enabling...
Enabling accurate and automated identification of wireless devices is critical for ensuring secure and authenticated data communication in large-scale networks such as IoT networks. In the aim of devising practical identification techniques that are immune to spoofing, hardware-driven RF fingerprinting using deep neural networks, which leverages the inevitable presence of...
Wireless device classification techniques play a key role in promoting emerging wireless applications such as allowing spectrum regulatory agencies to enforce their access policies and enabling network administrators to control access and prevent impersonation attacks to their wireless networks. Leveraging spectrum distortions of transmitted RF signals, caused by transceiver hardware...
This thesis proposes a novel technique that exploits spectrum occupancy behaviors inherent to wideband spectrum access to enable efficient cooperative spectrum sensing. The proposed technique reduces the number of required sensing measurements while accurately recovering spectrum occupancy information. It does so by leveraging compressive sampling theory to exploit the block-like...
The grid company enforces high penalties for the peak power demands of cloud data centers. These high penalties result in high electricity bills that can be avoided by relying on the servers' Uninterruptible Power Supply (UPS) as a source of energy during peak load periods. This thesis proposes a management...
Cognitive radio technology emerges as a promising solution for overcoming shortage and inefficient use of spectrum resources. In cognitive radio networks, secondary users, which are users equipped with cognitive radios, can opportunistically access spectrum assigned to primary users, the spectrum license holders. Although it improves spectrum utilization efficiency, this opportunistic...
This paper provides a measurement-based performance evaluation of the Optimized Link State Routing (OLSR) protocol. Two versions of OLSR, OLSR-ETX and OLSR-ETT, are implemented and evaluated on a mesh network that we built from off-the-shelf commercial components. OLSR-ETX uses the Expected Transmission Count (ETX) metric whereas, OLSR-ETT uses the Expected...
Trends in wireless networks are increasingly pointing towards a future with multi-hop
networks deployed in multi-channel environments. In this thesis, we present the design
for iMAC—a protocol targeted at medium access control in such environments. iMAC
uses control packets on a common control channel to faciliate a three-way handshake
between...
Mobile video streaming has become an essential application in mobile wireless networks,making up most of the mobile data of today’s Internet traffic. Studies have shown that mobile video data is projected to make up about 78 percent of the global mobile data traffic, and that global mobile data traffic is...
LoRaWAN networks are becoming more popular, and it is becoming common for developers to look at solutions utilizing Internet of Things concepts. In this paper, I introduce a Fenceless Grazing System utilizing the LoRaWAN network stack and discuss the limitations of this theorized network to better understand the scalability prior...
This thesis studies cooperative techniques that rely on femtocell user diversity to improve the downlink communication quality of macrocell users. We analytically analyze and evaluate the achievable performance of these techniques in the downlink of Rayleigh fading channels. We provide an approximation of both the bit-error rate (BER) and the...
Linear wireless sensor networks (LWSN) are special class of wireless sensor networks where sensor nodes are deployed in a straight line. Monitoring industrial pipelines, railroads, tunnels, power lines, and borders are applications of LWSNs. Wireless sensors are tiny devices with limited energy resources; therefore, efficient energy routing in LWSNs is...
Energy consumption has become a great deal for cloud service providers due to financial as well as environmental concerns. Studies show that cloud servers operate, most of the time, at only between 10% and 50% of their maximal utilizations. These same studies also show that servers that are kept ON...
The current state of research on gossip techniques for wireless broadcasting is very limited because past research efforts have mostly focused on using gossip techniques for multicast communication. On the other hand, those research efforts that have focused on using gossip techniques for wireless broadcast communications ignore energy efficiency and...
Physical-Layer Network Coding (PNC) is a promising technique that has great potentials for improving the achievable data rates of end-to-end flows through higher packet transmission rates, thereby increasing the overall network throughput. In this thesis, we study the performance of the PNC transmission techniques for unidirectional end-to-end flows in multi-hop...
The stupendous growth in wireless and mobile devices in the recent years has prompted researchers to look at innovative approaches that enable effective use of the available resources. In this thesis, we propose a medium access control (MAC) protocol, referred to as EM-MAC, that enables wireless devices with multi-channel access...
Besides enabling an enhanced mobile broadband access, fifth-generation (5G) wireless mobile networks are envisioned to support the connectivity of massive, heterogeneous Internet of Things (IoT) devices. Connecting these devices through 5G systems and providing them with their needed data rates require huge amounts of spectrum and power resources, thus calling...
The widespread use of wireless devices that we have recently been witnessing, such as smartphones, tablets, laptops, and wirelessly accessible devices in general, is causing an unprecedented growth in the required amount of the wireless radio spectrum. On the other hand, the spectrum resource has, for the last several decades,...
Autonomous vehicles bring great societal benefits but also potential impact and disruption to road safety, traffic congestion, and driving behaviors. One important technology that is indispensable to the success of such systems is vehicular networks. Vehicular networks provide the backbone for ensuring communication and connectivity among vehicles, all crucial to...
Substations are a crucial element at the transmission and distribution level of electric power systems. The primary substation equipment (power transformers and high voltage switching equipment) is used to transfer and transform electric energy by stepping up or down the voltage in transmission substations. Secondary equipment (such as IEDs, Intelligent...
RF-based signal identification and classification has received growing attention during recent years due to its potential use in many application domains. Of particular interest is Automatic Modulation Classification (AMC), which has been useful in addressing various spectrum related challenges such as signal jamming, policy enforcement, and spectrum sharing. Adopting AMC...
The meteoric rise and prevalent usage of wireless networking technologies for mobile
communication applications have captured the attention of media and imagination of
public in the recent decade. One such proliferation is experienced in Wireless Sensor
Networks (WSNs), where multimedia enabled elements are fused with integrated
sensors to empower tightly...
In wireless sensor networks (WSNs) nodes are battery powered. Therefore, the available
energy resources of sensor nodes should be managed efficiently in order to increase
the network lifetime. As a result, researchers have proposed routing schemes in order to
maximize network lifetime. Even though these schemes increase the network lifetime,...
We develop efficient coordination techniques that support inelastic traffic in large-scale distributed dynamic spectrum access DSA networks. By means of any learning algorithm, the proposed techniques enable DSA users to locate and exploit spectrum opportunities effectively, thereby increasing their achieved throughput (or "rewards" to be more general). Basically, learning algorithms...
As the number of wireless devices, the demand for high data rates, and the need for always-on connectivity are growing and becoming more stringent with the evolvement and emergence of 5G systems, network engineers and researchers are being faced with new unique challenges that need to be addressed. Among many...
Most of today’s Internet of Things (IoT) applications assume that data will be moved offdevices into centralized cloud platforms. While existing IoT systems leverage cloud-based analytics for meaningful data reasoning, the assumption that data should always be moved off the devices is problematic. The amount of data to be moved...
In this thesis, we propose a Blockchain-based distributed protocol for enabling deployment of dynamic, on-demand IoT networks. Specifically, the proposed protocol leverages Blockchain technology to: (i) enable distributed and secure authentication, registration, and management of IoT devices; (ii) provide fast discovery of IoT resources and scalable and secure instantiation of...