Skoufis, Aggelos Chatzithanasis, Georgios Dede, Georgia Filiopoulou, Evangelia Kamalakis, Thomas Michalakelis, Christos
Published in
Telecommunication systems
Recent years have seen an increasing need for higher broadband connections, fueled by novel applications including fifth generation wireless networks (5G). The European Commission is working on achieving specific milestones regarding the development of next generation networks. Many EU countries have opted to adopt a gradual migration path towards ...
Eswaran, Sivaraman Honnavalli, Prasad
Published in
Telecommunication systems
Today's modern enterprises are adjusting to new realities of connectivity. As companies become more distributed and autonomous, emerging applications demand more bandwidth, low latency, more spectrum, and higher reliability. 5G technology can aid many industries or enterprises to make quicker and better business decisions. Private 5G networks, also...
Galbally, J. Fierrez, J. Alonso-Fernandez, F. Martinez-Diaz, M.
Published in
Telecommunication Systems
The vulnerabilities of fingerprint-based recognition systems to direct attacks with and without the cooperation of the user are studied. Two different systems, one minutiae-based and one ridge feature-based, are evaluated on a database of real and fake fingerprints. Based on the fingerprint images quality and on the results achieved on different op...
Bagga, Palak Das, Ashok Kumar Chamola, Vinay Guizani, Mohsen
Published in
Telecommunication Systems
With rapid advancements in the technology, almost all the devices around are becoming smart and contribute to the Internet of Things (IoT) network. When a new IoT device is added to the network, it is important to verify the authenticity of the device before allowing it to communicate with the network. Hence, access control is a crucial security me...
Khan, Muhammad Khurram
Published in
Telecommunication systems
de Morais, Wladimir Gonçalves Santos, Carlos Eduardo Maffini Pedroso, Carlos Marcelo
Published in
Telecommunication systems
Video streaming currently dominates global Internet traffic. Live streaming broadcasts events in real-time, with very different characteristics compared to video-on-demand (VoD), being more sensitive to variations in delay, jitter, and packet loss. The use of adaptive streaming techniques over HTTP is massively deployed on the Internet, adapting th...
Khan, Muhammad Khurram
Published in
Telecommunication Systems
Basit, Abdul Zafar, Maham Liu, Xuan Javed, Abdul Rehman Jalil, Zunera Kifayat, Kashif
Published in
Telecommunication systems
In recent times, a phishing attack has become one of the most prominent attacks faced by internet users, governments, and service-providing organizations. In a phishing attack, the attacker(s) collects the client's sensitive data (i.e., user account login details, credit/debit card numbers, etc.) by using spoofed emails or fake websites. Phishing w...
Baidas, Mohammed W. Alsusa, Emad Alfarra, Motasem Al-Mubarak, Mubarak
Published in
Telecommunication Systems
This paper studies distributed multi-relay selection in energy-harvesting cooperative wireless networks and models it as an Indian Buffet Game (IBG). Particularly, the IBG is utilized to model the multi-relay selection decisions of network source nodes, while accounting for negative network externality. Two scenarios are considered: (1) constrained...
Bembe, Mncedisi Abu-Mahfouz, Adnan Masonta, Moshe Ngqondi, Tembisa
Published in
Telecommunication Systems
We are on the entry of the exponential advancement of the internet-of-things (IoT) due to the quick development of internet-connected smart-objects. As the number of connected smart-objects increase, IoT will continue to advance by providing connectivity and interactions between the physical and the cyber world. This connectivity is characterized b...