Trusted Cooperation Among Virtual Base Stations in C-RAN
نویسندگان
چکیده
منابع مشابه
Cooperation Strategies for Partly Wireless C-RAN
This letter presents a variant of cloud radio access network (C-RAN) architecture, which we term partly wireless C-RAN (PW-CRAN). It is characterized by extra radio nodes connected through the existing remote radio heads (RRHs). Because of the newly connected nodes and the consequent additional delay, the operation of PW-CRAN requires different approaches compared to that of the typical C-RAN. ...
متن کاملThe Emergence of Compact Base Stations in the New RAN Architecture Paradigm
© 2010 ABI Research • www.abiresearch.com The material contained herein is for the individual use of the purchasing Licensee and may not be distributed to any other person or entity by such Licensee including, without limitation, to persons within the same corporate or other entity as such Licensee, without the express written permission of Licensor. The Emergence of Compact Base Stations in th...
متن کاملTrusted Base Stations-Based Privacy Preserving Technique in Location-Based Services
With the advent in mobile and internet technologies, there is a significant increase in the number of users using smartphones and other internet based applications. There are a large number of applications available online that use the internet and provide useful information to the users. These include ones that provide location-based services e.g. google maps etc. These applications provide ma...
متن کاملNeurobehavioral effects among inhabitants around mobile phone base stations.
BACKGROUND There is a general concern on the possible hazardous health effects of exposure to radiofrequency electromagnetic radiations (RFR) emitted from mobile phone base station antennas on the human nervous system. AIM To identify the possible neurobehavioral deficits among inhabitants living nearby mobile phone base stations. METHODS A cross-sectional study was conducted on (85) inhabi...
متن کاملBehavior-based Attestation of Policy Enforcement among Trusted Virtual Domains
With serious situation of data leakage in many enterprises, sensitive dataflow protection based on Trusted Virtual Domains (TVD) has been gradually paid much attention to. Remote attestation among two or more entities across trusted virtual domains is an important means to ensure sensitive dataflow. According to behavior compliance, this paper proposes a behavior-based attestation of policy enf...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2018
ISSN: 2169-3536
DOI: 10.1109/access.2018.2873758