Papers
Topics
Authors
Recent
Detailed Answer
Quick Answer
Concise responses based on abstracts only
Detailed Answer
Well-researched responses based on abstracts and relevant paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses
Gemini 2.5 Flash
Gemini 2.5 Flash 37 tok/s
Gemini 2.5 Pro 44 tok/s Pro
GPT-5 Medium 14 tok/s Pro
GPT-5 High 14 tok/s Pro
GPT-4o 90 tok/s Pro
Kimi K2 179 tok/s Pro
GPT OSS 120B 462 tok/s Pro
Claude Sonnet 4 37 tok/s Pro
2000 character limit reached

Edge-computing Enabled Next Generation Wireless Networks: A Novel Approach to Provide Secure Multicast Services (2202.03134v1)

Published 7 Feb 2022 in cs.NI

Abstract: Smart grids have received much attention in recent years in order to optimally manage the resources, transmission and consumption of electric power.In these grids, one of the most important communication services is the multicast service. Providing multicast services in the smart communicative grid poses several challenges, including the heterogeneity of different communication media and the strict requirements of reliability, security and latency. Wireless technologies and PLC connections are the two most important media used in this grid, among which PLC connections are very unstable, which makes it difficult to provide reliability. In this research, the problem of geographically flooding of multicast data has been considered. First, this problem has been modeled as an optimization problem which is used as a reference model in evaluating the proposed approaches. Then, two MKMB and GCBT multicast tree formation algorithms have been developed based on geographical information according to the characteristics of smart grids. Comparison of these two approaches shows the advantages and disadvantages of forming a core-based tree compared to a source-based tree. Evaluation of these approaches shows a relative improvement in tree cost and the amount of end-to-end delay compared to basic algorithms. In the second part, providing security and reliability in data transmission has been considered. Both Hybrid and Multiple algorithms have been developed based on the idea of multiple transmission tree. In the Hybrid algorithm, the aim is to provide higher security and reliability, but in the Multiple algorithms, minimization of message transmission delay is targeted. In the section of behavior evaluation, these two algorithms have been studied in different working conditions, which indicates the achievement of the desired goals.

List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.

Summary

We haven't generated a summary for this paper yet.

Dice Question Streamline Icon: https://streamlinehq.com

Follow-Up Questions

We haven't generated follow-up questions for this paper yet.

Authors (1)