Intelligent Security Management and Control in the IoT. Mohamed-Aymen Chalouf. Читать онлайн. Newlib. NEWLIB.NET

Автор: Mohamed-Aymen Chalouf
Издательство: John Wiley & Sons Limited
Серия:
Жанр произведения: Зарубежная компьютерная литература
Год издания: 0
isbn: 9781394156023
Скачать книгу
access procedure analysis. In The Latin-American Conference on Communications (LATINCOM). IEEE, Guadalajara.

      Bicheno, S. (2015). Intel, Nokia and Ericsson collaborate on NB-LTE wireless for IoT [Online]. Available at: https://telecoms.com/441951/intel-nokia-and-ericsson-collaborate-on-nb-lte-wireless-for-iot/ [Accessed 1 February 2022]

      Bouzouita, M., Hadjadj-Aoul, Y., Zangar, N., Rubino, G., Tabbane, S. (2015). Multiple access class barring factors algorithm for M2M communications in LTE-advanced networks. In 18th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, MSWiM’15. ACM, New York.

      Bouzouita, M., Hadjadj-Aoul, Y., Zangar, N., Rubino, G. (2019). Estimating the number of contending IoT devices in 5G networks: Revealing the invisible. Transactions on Emerging Telecommunications Technologies, 30(4), e3513.

      Cheng, R.C., Chen, J., Chen, D.W., Wei, C.H. (2015). Modeling and analysis of an extended access barring algorithm for machine-type communications in LTE-A Networks. IEEE Transactions on Wireless Communications, 14(6), 2956–2968.

      ETSI (2011). LTE; Evolved Universal Terrestrial Radio Access (E-UTRA); physical channels and modulation. TR ETSI TS 136.211, version 10.0.0 [Online]. Available at: https://www.etsi.org/deliver/etsi_TS/136200_136299/136211/15.02.00_60/ts_136211v150200p.pdf [Accessed 14 October 2020].

      ETSI (2019). LTE; Evolved Universal Terrestrial Radio Access (E-UTRA); Radio Resource Control (RRC); protocol specification (3GPP TS 36.331, version 14.12.0 Release 14). TS 136 331, version 14.12.0 [Online]. Available at: https://www.etsi.org/deliver/etsi_ts/136300_136399/136331/13.00.00_60/ts_136331v130000p.pdf [Accessed 14 October 2020].

      Flore, D. (2016). 3GPP standards for the Internet-of-Things. gSMA MIoT [Online]. Available at: http://www.3gpp.org/news-events/3gpp-news/1766-iot_progress [Accessed 14 October 2020].

      Fujimoto, S., van Hoof, H., Meger, D. (2018). Addressing function approximation error in actor-critic methods. In The 35th International Conference on Machine Learning. ICML, Stockholm.

      GSMA Intelligence (2020). Mobile IoT (LPWA) [Online]. Available at: https://www.gsma.com/iot/mobile-iot/ [Accessed 14 October 2020].

      Hadjadj-Aoul, Y. and Ait-Chellouche, S. (2020). Access control in NB-IoT networks: A deep reinforcement learning strategy. Information 11(11), 541 [Online]. Available at: https://doi.org/10.3390/info11110541.

      Harwahyu, R., Cheng, R.G., Wei, C.H., Sari, R.F (2018). Optimization of random access channel in NB-IoT. IEEE Internet of Things Journal, 5(1), 391–402.

      Harwahyu, R., Cheng, R.G., Tsai, W.J., Hwang, J.K., Bianchi, G. (2019). Repetitions vs Retransmissions: Trade-off in configuring NB-IoT random access channels. IEEE Internet of Things Journal, 6(2), 3796–3805.

      Huawei (2017). NB-IoT commercial premier use case library [Online]. Available at: https://www.gsma.com/iot/wp-content/uploads/2017/12/NB-IoT-Commercial-Premier-Use-case-Library-1.0_Layout_171110.pdf [Accessed 14 October 2020].

      Jeon, W.S., Seo, S.B., Jeong, D.G. (2018). Effective frequency hopping pattern for ToA estimation in NB-IoT random access. IEEE Transactions on Vehicular Technology, 67(10), 10150–10154.

      Jiang, N., Deng, Y., Condoluci, M., Guo, W., Nallanathan, A., Dohler, M. (2018). RACH preamble repetition in NB-IoT network. IEEE Communications Letters, 22(6), 1244–1247.

      Jin, H., Toor, W.T., Jung, B.C., Seo, J.B. (2017). Recursive pseudo-Bayesian access class barring for M2M communications in LTE systems. IEEE Transactions on Vehicular Technology, 66(9), 8595–8599.

      Kafle, V.P., Fukushima, Y., Harai, H. (2016). Internet of Things standardization in ITU and prospective networking technologies. IEEE Communications Magazine, 54(9), 43–49.

      Lin, X., Adhikary, A., Wang, Y.-E. (2016). Random access preamble design and detection for 3GPP narrowband IoT systems. IEEE Wireless Communications Letters, 5(6), 640–643.

      Liu, J., Agiwal, M., Qu, M., Jin, H. (2020). Online control of preamble groups with priority in massive IoT networks. IEEE Journal on Selected Areas in Communications. doi:10.1109/JSAC.2020.3018964.

      Migabo, E.M., Djouani, K.D., Kurien, A.M. (2020). The narrowband Internet of Things (NB-IoT) resources management performance state of art, challenges, and opportunities. IEEE Access, 8, 97658–97675, doi: 10.1109/ACCESS.2020.2995938.

      Mwakwata, C.B., Malik, H., Mahtab Alam, M., Le Moullec, Y., Parand, S., Mumtaz, S. (2019). Narrowband Internet of Thing (NB-IoT): From Physical (PHY) and Media Access Control (MAC) layers perspectives. Sensors, 19(11), 2613.

      Narayanan, S., Tsolkas, D., Passas, N., Merakos, L. (2018). NB-IoT: A candidate technology for massive IoT in the 5G era. In IEEE 23rd International Workshop on Computer Aided Modeling Design of Communication Links and Network (CAMAD). IEEE, Barcelona.

      Park, A. and Lim, X. (2016). Adaptive access class barring method for machine generated communications. Mobile Information Systems, 1–6. doi:10.1155/2016/6923542.

      Ray, B. (2017). NB-IoT case studies. Link-labs [Online]. Available at: https://www.link-labs.com/blog/nb-iot-case-studies [Accessed 14 October 2020].

      Rolnick, D., Veit, A., Belongie, S.J., Shavit, N. (2017). Deep learning is robust to massive label noise [Online]. Available at: https://arxiv.org/abs/1705.10694 [Accessed 14 October 2020].

      Savaux, V., Le Guen, M., Kanj, M. (2020). A tutorial on NB-IoT physical layer design. IEEE Communications Surveys & Tutorials, 22(4).

      Sun, Y., Tong, F., Zhang, Z., He, S. (2017). Throughput modeling and analysis of random access in narrow-band Internet of Things. IEEE Internet of Things, 5(3), 1485–1493.

      Sutton, R.S. and Barto, A.G. (2019). Reinforcement Learning: An Introduction, 2nd edition. MIT Press, Cambridge.

      Thrun, S. and Schwartz, A. (1993). Issues in using function approximation for reinforcement learning. In Proceedings of the 1993 Connectionist Models Summer School, Mozer, M., Smolensky, P., Touretzky, D., Elman, J., Weigend, A. (eds). Lawrence Erlbaum, Hillsdale.

      Toor, W.T. and Jin, H. (2017). Comparative study of access class barring and extended access barring for machine type communications. In International Conference on Information and Communication Technology Convergence (ICTC). KICS, IEEE, Jeju Island, 12.

      Wang, Y.-P.-E., Lin, X., Adhikary, A., Grovlen, A., Sui, Y., Blankenship, Y., Bergman, J., Razaghi, H.S. (2017).