首页 > 最新文献

2018 Twenty Fourth National Conference on Communications (NCC)最新文献

英文 中文
Optimization of Majority Rule Threshold in Double Threshold Based Cooperative Cognitive Radio Network 双阈值协同认知无线电网络中多数规则阈值的优化
Pub Date : 2018-02-01 DOI: 10.1109/NCC.2018.8599992
Priyanka Maity, Siddharth Deshmukh
In this paper, we investigate a double threshold based cooperative spectrum sensing scenario. Our objective is to determine the optimal threshold for majority rule which must be selected for minimum error in final decision. The CR sensors are assumed to make local hard decisions based on conventional energy detection technique and communicate one bit decision information to the fusion center. Here we assume that sensors whose test statistics fall in ambiguity region do not report to the fusion center. A majority rule is applied at the fusion center in which at least threshold $n$* number of local sensor decision must favor for presence of primary user (PU) to make the final decision on presence of PU. Since choice of $n$* decides error in final decision, we formulate an expression to compute optimal value $n$*, i.e., n*opt which minimizes error in final decision. Further, due to uncertainty in number of sensors with test statistics in ambiguity region, the threshold n*opt also becomes a random variable. Hence we derive a statistical model to characterize the density function of number of sensors with test statistics in ambiguity region, and later exploit it to derive an expression for expected value of n*opt. Our simulation results validate our approach in which we show by selecting n*opt as threshold for majority rule, the error in final decision is at its minimum value.
本文研究了一种基于双阈值的协同频谱感知场景。我们的目标是确定多数决规则的最佳阈值,在最终决策中必须选择最小误差。假设CR传感器在常规能量检测技术的基础上进行局部硬决策,并将一比特决策信息传递给融合中心。这里我们假设测试统计量落在模糊区域的传感器不向融合中心报告。在融合中心应用多数决原则,即至少有阈值$n$*个数的本地传感器决策必须有利于主用户(PU)的存在,从而对PU的存在做出最终决策。由于$n$*的选择决定了最终决策的误差,因此我们用表达式来计算使最终决策误差最小的最优值$n$*,即n*opt。进一步,由于模糊区域具有测试统计量的传感器数量的不确定性,阈值n*opt也成为随机变量。因此,我们推导了一个统计模型,用模糊区域的测试统计量来表征传感器数量的密度函数,并利用该模型推导出n*opt期望值的表达式。我们的仿真结果验证了我们的方法,通过选择n*opt作为多数决原则的阈值,最终决策的误差处于最小值。
{"title":"Optimization of Majority Rule Threshold in Double Threshold Based Cooperative Cognitive Radio Network","authors":"Priyanka Maity, Siddharth Deshmukh","doi":"10.1109/NCC.2018.8599992","DOIUrl":"https://doi.org/10.1109/NCC.2018.8599992","url":null,"abstract":"In this paper, we investigate a double threshold based cooperative spectrum sensing scenario. Our objective is to determine the optimal threshold for majority rule which must be selected for minimum error in final decision. The CR sensors are assumed to make local hard decisions based on conventional energy detection technique and communicate one bit decision information to the fusion center. Here we assume that sensors whose test statistics fall in ambiguity region do not report to the fusion center. A majority rule is applied at the fusion center in which at least threshold $n$* number of local sensor decision must favor for presence of primary user (PU) to make the final decision on presence of PU. Since choice of $n$* decides error in final decision, we formulate an expression to compute optimal value $n$*, i.e., n*opt which minimizes error in final decision. Further, due to uncertainty in number of sensors with test statistics in ambiguity region, the threshold n*opt also becomes a random variable. Hence we derive a statistical model to characterize the density function of number of sensors with test statistics in ambiguity region, and later exploit it to derive an expression for expected value of n*opt. Our simulation results validate our approach in which we show by selecting n*opt as threshold for majority rule, the error in final decision is at its minimum value.","PeriodicalId":121544,"journal":{"name":"2018 Twenty Fourth National Conference on Communications (NCC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121056724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Inferring the Deployment of Source Address Validation Filtering using Silence of Path-Backscatter 基于路径反向散射沉默的源地址验证过滤部署推演
Pub Date : 2018-02-01 DOI: 10.1109/NCC.2018.8600212
S. Saurabh, A. Sairam
IP source spoofing is a consequence of lack of packet level authentication in the Internet which allows attackers to carry out Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. Source address validation filtering is one of the most important scheme that is deployed in the Internet to deter such attacks by filtering the spoofed IP packets. In this paper, we propose a novel scheme to study the deployment of source address validation-filtering by using some special path backscatter messages that are generated by the spoofed traffic. We use the long term absence of such messages from an Autonomous System (AS) to classify it as non-spoofer AS. We use Caida's backscatter dataset for our study. We provide the list of spoofer and non-spoofer ASes from the given dataset. We also provide detailed mathematical analysis for calculating the amount of time we need to wait before declaring an AS as a non-spoofer. Besides, we use the normal approximation of binomial distribution to calculate confidence interval for the proportion of ASes allowing spoofing and to test the hypothesis regarding the spoofing activity in the Internet.
IP源欺骗是互联网中缺乏数据包级认证的结果,它允许攻击者进行拒绝服务(DoS)和分布式拒绝服务(DDoS)攻击。源地址验证过滤是Internet上最重要的一种通过过滤欺骗IP报文来阻止此类攻击的方案。本文提出了一种利用欺骗流量产生的一些特殊路径反向散射消息来研究源地址验证过滤部署的新方案。我们使用来自自治系统(AS)的此类消息的长期缺失将其分类为非欺骗AS。我们使用Caida的反向散射数据集进行研究。我们提供了来自给定数据集的欺骗和非欺骗ase列表。我们还提供了详细的数学分析,用于计算在将AS声明为非欺骗者之前需要等待的时间。此外,我们使用二项分布的正态近似来计算允许欺骗的asa比例的置信区间,并检验关于互联网中欺骗活动的假设。
{"title":"Inferring the Deployment of Source Address Validation Filtering using Silence of Path-Backscatter","authors":"S. Saurabh, A. Sairam","doi":"10.1109/NCC.2018.8600212","DOIUrl":"https://doi.org/10.1109/NCC.2018.8600212","url":null,"abstract":"IP source spoofing is a consequence of lack of packet level authentication in the Internet which allows attackers to carry out Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. Source address validation filtering is one of the most important scheme that is deployed in the Internet to deter such attacks by filtering the spoofed IP packets. In this paper, we propose a novel scheme to study the deployment of source address validation-filtering by using some special path backscatter messages that are generated by the spoofed traffic. We use the long term absence of such messages from an Autonomous System (AS) to classify it as non-spoofer AS. We use Caida's backscatter dataset for our study. We provide the list of spoofer and non-spoofer ASes from the given dataset. We also provide detailed mathematical analysis for calculating the amount of time we need to wait before declaring an AS as a non-spoofer. Besides, we use the normal approximation of binomial distribution to calculate confidence interval for the proportion of ASes allowing spoofing and to test the hypothesis regarding the spoofing activity in the Internet.","PeriodicalId":121544,"journal":{"name":"2018 Twenty Fourth National Conference on Communications (NCC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128451156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rewrite Cost optimal Rank Modulation Codes in S4 and S5 重写S4和S5的成本最优秩调制码
Pub Date : 2018-02-01 DOI: 10.1109/NCC.2018.8600115
Arijit Dutta, S. Vijayakumaran
In this paper, we have found all possible largest permutation codes in S4and S5under Kendall T-distance. We consider two rewrite operations namely push-to-the-top and minimal-push-up and give the optimum codes in terms of rewrite cost for both these techniques. These optimum codes can be obtained from a set of relatively smaller size for both the cases. We also give the largest single error correcting Gray code when minimal-push-up is used.
在Kendall t -距离下,我们找到了s4和s55中所有可能的最大排列码。我们考虑了两种重写操作,即push-to- top和minimum -push-up,并根据这两种技术的重写成本给出了最佳代码。对于这两种情况,都可以从一个相对较小的码集中得到这些最优码。当使用最小俯卧撑时,我们也给出了最大的单次纠错格雷码。
{"title":"Rewrite Cost optimal Rank Modulation Codes in S4 and S5","authors":"Arijit Dutta, S. Vijayakumaran","doi":"10.1109/NCC.2018.8600115","DOIUrl":"https://doi.org/10.1109/NCC.2018.8600115","url":null,"abstract":"In this paper, we have found all possible largest permutation codes in S4and S5under Kendall T-distance. We consider two rewrite operations namely push-to-the-top and minimal-push-up and give the optimum codes in terms of rewrite cost for both these techniques. These optimum codes can be obtained from a set of relatively smaller size for both the cases. We also give the largest single error correcting Gray code when minimal-push-up is used.","PeriodicalId":121544,"journal":{"name":"2018 Twenty Fourth National Conference on Communications (NCC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116373449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Caching Policies for Transient Data 暂态数据缓存策略
Pub Date : 2018-02-01 DOI: 10.1109/NCC.2018.8600030
Santosh Fatale, Sri Prakash, Sharayu Moharir
This work focuses on designing caching policies for transient data, i.e., data which can be used to serve requests only for a finite duration of time after which it becomes redundant. We first characterize the fundamental limit on the performance of caching policies for transient data and characterize the performance of traditional caching policies like LRU for this setting. Traditional caching policies often make decisions based on the popularity of the data being cached. We propose a new caching policy which uses both the popularity and the residual lifetime (time remaining before the data becomes redundant) to make caching decisions. We show that in the setting where data being cached is transient, our policy outperforms traditional caching policies.
这项工作的重点是为瞬态数据设计缓存策略,即只能在有限的时间内用于服务请求的数据,之后它就变得冗余了。我们首先描述了用于暂态数据的缓存策略性能的基本限制,并描述了用于此设置的传统缓存策略(如LRU)的性能。传统的缓存策略通常根据被缓存数据的流行程度做出决策。我们提出了一种新的缓存策略,它使用流行度和剩余生存期(数据变得冗余之前的剩余时间)来做出缓存决策。我们展示了在缓存数据是临时的设置中,我们的策略优于传统的缓存策略。
{"title":"Caching Policies for Transient Data","authors":"Santosh Fatale, Sri Prakash, Sharayu Moharir","doi":"10.1109/NCC.2018.8600030","DOIUrl":"https://doi.org/10.1109/NCC.2018.8600030","url":null,"abstract":"This work focuses on designing caching policies for transient data, i.e., data which can be used to serve requests only for a finite duration of time after which it becomes redundant. We first characterize the fundamental limit on the performance of caching policies for transient data and characterize the performance of traditional caching policies like LRU for this setting. Traditional caching policies often make decisions based on the popularity of the data being cached. We propose a new caching policy which uses both the popularity and the residual lifetime (time remaining before the data becomes redundant) to make caching decisions. We show that in the setting where data being cached is transient, our policy outperforms traditional caching policies.","PeriodicalId":121544,"journal":{"name":"2018 Twenty Fourth National Conference on Communications (NCC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114489232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Batch Look Ahead Orthogonal Matching Pursuit 批量前瞻正交匹配追踪
Pub Date : 2018-02-01 DOI: 10.1109/NCC.2018.8600087
Muralikrishnna G. Sethuraman, Sooraj K. Ambat, K. Hari
Compressed sensing (CS) is a sampling paradigm that enables sampling signals at sub Nyquist rates by exploiting the sparse nature of signals. One of the main concerns in CS is the reconstruction of the signal after sampling. Many reconstruction algorithms have been proposed in the literature for the recovery of the sparse signals - Basis Pursuit, Orthogonal Matching Pursuit (OMP), Look Ahead Orthogonal Matching Pursuit (LAOMP) are some of the popular reconstruction algorithms. LAOMP, a modification of OMP, improves the reconstruction accuracy of OMP by employing a look ahead procedure. But LAOMP suffers from the drawback of being very expensive in terms of the computational time. In this paper we propose a modified version of the LAOMP algorithm called Batch-LAOMP which has a lesser computational complexity and also gives better performance in terms of reconstruction accuracy as seen from the results of the numerical experiments.
压缩感知(CS)是一种采样范例,通过利用信号的稀疏特性,可以以亚奈奎斯特速率采样信号。CS的主要问题之一是采样后信号的重建。文献中提出了许多用于稀疏信号恢复的重构算法,其中基追踪、正交匹配追踪(OMP)、前瞻正交匹配追踪(LAOMP)是比较流行的重构算法。LAOMP是对OMP的一种改进,它采用了一种超前的方法,提高了OMP的重建精度。但是LAOMP的缺点是在计算时间方面非常昂贵。本文提出了一种改进的LAOMP算法,称为Batch-LAOMP,该算法具有较低的计算复杂度,并且从数值实验结果来看,在重建精度方面具有更好的性能。
{"title":"Batch Look Ahead Orthogonal Matching Pursuit","authors":"Muralikrishnna G. Sethuraman, Sooraj K. Ambat, K. Hari","doi":"10.1109/NCC.2018.8600087","DOIUrl":"https://doi.org/10.1109/NCC.2018.8600087","url":null,"abstract":"Compressed sensing (CS) is a sampling paradigm that enables sampling signals at sub Nyquist rates by exploiting the sparse nature of signals. One of the main concerns in CS is the reconstruction of the signal after sampling. Many reconstruction algorithms have been proposed in the literature for the recovery of the sparse signals - Basis Pursuit, Orthogonal Matching Pursuit (OMP), Look Ahead Orthogonal Matching Pursuit (LAOMP) are some of the popular reconstruction algorithms. LAOMP, a modification of OMP, improves the reconstruction accuracy of OMP by employing a look ahead procedure. But LAOMP suffers from the drawback of being very expensive in terms of the computational time. In this paper we propose a modified version of the LAOMP algorithm called Batch-LAOMP which has a lesser computational complexity and also gives better performance in terms of reconstruction accuracy as seen from the results of the numerical experiments.","PeriodicalId":121544,"journal":{"name":"2018 Twenty Fourth National Conference on Communications (NCC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121956041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multiview 3D Reconstruction of Underwater Scenes Acquired With a Single Refractive Layer Using Structure from Motion 基于运动结构的单折射层水下场景多视角三维重建
Pub Date : 2018-02-01 DOI: 10.1109/NCC.2018.8599972
P. Vs, Jiji Charangatt Victor
3D reconstruction of underwater objects is a challenging problem in computer vision due to the scattering and absorption of light which leads to contrast and colour degradations of the acquired images. In addition, refraction across media boundaries introduces geometric variations which lead to erroneous correspondence matching between images. In this paper, we present a refraction reconstruction model to compensate for refractive errors. Our model is for images acquired with the camera above the water surface instead of underwater camera images, excluding the possible refraction across glass-water interface. The corrected images are used under a multi-view 3D reconstruction framework to produce the 3D geometry of the underwater objects as well as camera pose.
水下物体的三维重建在计算机视觉中是一个具有挑战性的问题,因为光的散射和吸收会导致获得的图像的对比度和颜色下降。此外,跨媒体边界的折射引入几何变化,导致图像之间的错误对应匹配。本文提出了一种补偿折射误差的折射重建模型。我们的模型是针对水面上的相机图像而不是水下相机图像,排除了玻璃-水界面上可能的折射。校正后的图像在多视图三维重建框架下使用,生成水下物体的三维几何形状和相机姿态。
{"title":"Multiview 3D Reconstruction of Underwater Scenes Acquired With a Single Refractive Layer Using Structure from Motion","authors":"P. Vs, Jiji Charangatt Victor","doi":"10.1109/NCC.2018.8599972","DOIUrl":"https://doi.org/10.1109/NCC.2018.8599972","url":null,"abstract":"3D reconstruction of underwater objects is a challenging problem in computer vision due to the scattering and absorption of light which leads to contrast and colour degradations of the acquired images. In addition, refraction across media boundaries introduces geometric variations which lead to erroneous correspondence matching between images. In this paper, we present a refraction reconstruction model to compensate for refractive errors. Our model is for images acquired with the camera above the water surface instead of underwater camera images, excluding the possible refraction across glass-water interface. The corrected images are used under a multi-view 3D reconstruction framework to produce the 3D geometry of the underwater objects as well as camera pose.","PeriodicalId":121544,"journal":{"name":"2018 Twenty Fourth National Conference on Communications (NCC)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121755341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimal rate control in a quasi-static wireless fading channel with throughput and power constraints 具有吞吐量和功率约束的准静态无线衰落信道的最优速率控制
Pub Date : 2018-02-01 DOI: 10.1109/NCC.2018.8599975
R. R, U. Mukherji
We propose a novel recursive algorithm for determining the optimal admission and transmission rates for an M/M/1 transmitter buffer for obtaining minimum average queue length, under quasi-static fading, while satisfying a throughput constraint with given available transmit power. The optimal rate setting policy is obtained with significant savings in memory and computational complexity, and is simple and easy to implement.
在准静态衰落条件下,在满足给定可用发射功率的吞吐量约束下,提出了一种新的递归算法来确定M/M/1发送缓冲器的最佳接收速率和传输速率,以获得最小的平均队列长度。得到了最优的速率设置策略,大大节省了内存和计算复杂度,并且简单容易实现。
{"title":"Optimal rate control in a quasi-static wireless fading channel with throughput and power constraints","authors":"R. R, U. Mukherji","doi":"10.1109/NCC.2018.8599975","DOIUrl":"https://doi.org/10.1109/NCC.2018.8599975","url":null,"abstract":"We propose a novel recursive algorithm for determining the optimal admission and transmission rates for an M/M/1 transmitter buffer for obtaining minimum average queue length, under quasi-static fading, while satisfying a throughput constraint with given available transmit power. The optimal rate setting policy is obtained with significant savings in memory and computational complexity, and is simple and easy to implement.","PeriodicalId":121544,"journal":{"name":"2018 Twenty Fourth National Conference on Communications (NCC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123179883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Combinatorial Design Based Data En-Route Filtering Scheme for Wireless Sensor Networks 一种基于组合设计的无线传感器网络数据路由滤波新方案
Pub Date : 2018-02-01 DOI: 10.1109/NCC.2018.8600153
Alok Kumar, A. R. Pais
Wireless sensor networks are susceptible to report fabrication attacks, where adversary can use compromised nodes to flood the network with false reports. En-route filtering is a mechanism of dropping bogus/false reports while they are being forwarded towards the sink. Majority of the proposed en-route filtering schemes are probabilistic, where the originality of forwarded reports is checked with fixed probability by intermediate nodes. Thus, false reports can travel multiple hops before being dropped in probabilistic en-route filtering schemes. Few deterministic based en-route filtering schemes have also been proposed, but all such schemes need to send the reports through fixed paths. To overcome the above mentioned limitations of existing en-route filtering schemes, we propose a novel deterministic enroute filtering scheme. In the proposed scheme, secret keys are allocated to sensor nodes based on combinatorial design. Such design ensures direct communication between any two nodes without adding more key storage overhead. We provide in-depth analysis for the proposed scheme. The proposed scheme significantly outperforms existing schemes in terms of expected filtering position of false reports and is more buoyant to selective forwarding and report disruption attacks. Our scheme also performs neck-to-neck with existing schemes in terms of protocol overheads.
无线传感器网络容易受到虚假报告攻击,攻击者可以利用受损节点向网络发送虚假报告。路由过滤是一种丢弃虚假/错误报告的机制,当它们被转发到接收器时。大多数路由过滤方案都是概率性的,其中转发的报告的原创性由中间节点以固定的概率进行检查。因此,在概率路由过滤方案中,错误报告在被丢弃之前可以经过多个跳。一些基于确定性的路由过滤方案也被提出,但所有这些方案都需要通过固定的路径发送报告。为了克服现有路由过滤方案的上述局限性,我们提出了一种新的确定性路由过滤方案。在该方案中,基于组合设计将密钥分配给传感器节点。这样的设计确保了任意两个节点之间的直接通信,而不会增加更多的密钥存储开销。我们对提议的方案进行了深入的分析。在虚假报告的预期过滤位置方面,该方案明显优于现有方案,并且更容易受到选择性转发和报告中断攻击。我们的方案在协议开销方面也与现有方案并驾齐驱。
{"title":"A New Combinatorial Design Based Data En-Route Filtering Scheme for Wireless Sensor Networks","authors":"Alok Kumar, A. R. Pais","doi":"10.1109/NCC.2018.8600153","DOIUrl":"https://doi.org/10.1109/NCC.2018.8600153","url":null,"abstract":"Wireless sensor networks are susceptible to report fabrication attacks, where adversary can use compromised nodes to flood the network with false reports. En-route filtering is a mechanism of dropping bogus/false reports while they are being forwarded towards the sink. Majority of the proposed en-route filtering schemes are probabilistic, where the originality of forwarded reports is checked with fixed probability by intermediate nodes. Thus, false reports can travel multiple hops before being dropped in probabilistic en-route filtering schemes. Few deterministic based en-route filtering schemes have also been proposed, but all such schemes need to send the reports through fixed paths. To overcome the above mentioned limitations of existing en-route filtering schemes, we propose a novel deterministic enroute filtering scheme. In the proposed scheme, secret keys are allocated to sensor nodes based on combinatorial design. Such design ensures direct communication between any two nodes without adding more key storage overhead. We provide in-depth analysis for the proposed scheme. The proposed scheme significantly outperforms existing schemes in terms of expected filtering position of false reports and is more buoyant to selective forwarding and report disruption attacks. Our scheme also performs neck-to-neck with existing schemes in terms of protocol overheads.","PeriodicalId":121544,"journal":{"name":"2018 Twenty Fourth National Conference on Communications (NCC)","volume":"7 Sup2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128290335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Throughput Optimal Scheduling for Wireless Downlinks with Reconfiguration Delay 具有重配置延迟的无线下行链路吞吐量最优调度
Pub Date : 2018-02-01 DOI: 10.1109/NCC.2018.8600191
V. Sukumaran
We consider wireless downlinks where the base station dynamically switches between different users in order to transmit data intended for the respective users. When the base station switches from serving one user to another, there is a reconfiguration delay. For such wireless downlinks with reconfiguration delay we consider the problem of throughput optimal scheduling. We propose the 1-lookahead scheduling policy and analytically show that it is throughput optimal. We obtain the 1-lookahead policy by using an approximate solution to a Markov decision process formulation of the scheduling problem. The approximate solution is also used to explain the biased maxweight form of 1-lookahead as well as an existing policy.
我们考虑无线下行链路,其中基站在不同用户之间动态切换,以便为各自的用户传输数据。当基站从服务一个用户切换到另一个用户时,存在重新配置延迟。对于这种具有重构延迟的无线下行链路,我们考虑了吞吐量最优调度问题。我们提出了1- forward调度策略,并分析证明了该策略是吞吐量最优的。我们利用调度问题的马尔可夫决策过程公式的近似解,得到了1- forward策略。近似解还用于解释1- forward的有偏最大权重形式以及现有策略。
{"title":"Throughput Optimal Scheduling for Wireless Downlinks with Reconfiguration Delay","authors":"V. Sukumaran","doi":"10.1109/NCC.2018.8600191","DOIUrl":"https://doi.org/10.1109/NCC.2018.8600191","url":null,"abstract":"We consider wireless downlinks where the base station dynamically switches between different users in order to transmit data intended for the respective users. When the base station switches from serving one user to another, there is a reconfiguration delay. For such wireless downlinks with reconfiguration delay we consider the problem of throughput optimal scheduling. We propose the 1-lookahead scheduling policy and analytically show that it is throughput optimal. We obtain the 1-lookahead policy by using an approximate solution to a Markov decision process formulation of the scheduling problem. The approximate solution is also used to explain the biased maxweight form of 1-lookahead as well as an existing policy.","PeriodicalId":121544,"journal":{"name":"2018 Twenty Fourth National Conference on Communications (NCC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128382740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Modeling and Outage Analysis of DF Relay assisted mixed PLC-VLC System DF继电器辅助PLC-VLC混合系统建模及故障分析
Pub Date : 2018-02-01 DOI: 10.1109/NCC.2018.8600049
Manan Jani, Parul Gargt, Akash Gupta
In this paper, a novel dual hop Decode-and-Forward (DF) relay assisted deeply integrated Power Line Communications (PLC) - Visible Light Communications (VLC) system is proposed. The PLC link is assumed to be affected by Log-Normal fading and additive background and impulsive noises whereas the channel characteristics of the VLC link are analyzed statistically as a function of the randomness of the position of the end users. In this study, novel closed form expressions of the cumulative distribution function (CDF) of the equivalent end to end signal-to-noise ratio (SNR) are derived. Also, we analyze the performance of the system in terms of the user outage probability to maintain Quality of Service (QoS).
提出了一种新型的双跳译码转发(DF)中继辅助电力线通信(PLC) -可见光通信(VLC)深度集成系统。假定PLC链路受对数正态衰落、加性背景和脉冲噪声的影响,而VLC链路的信道特性作为终端用户位置随机性的函数进行了统计分析。本文推导了等效端到端信噪比(SNR)的累积分布函数(CDF)的新颖封闭表达式。此外,我们还根据用户中断概率分析了系统的性能,以保持服务质量(QoS)。
{"title":"Modeling and Outage Analysis of DF Relay assisted mixed PLC-VLC System","authors":"Manan Jani, Parul Gargt, Akash Gupta","doi":"10.1109/NCC.2018.8600049","DOIUrl":"https://doi.org/10.1109/NCC.2018.8600049","url":null,"abstract":"In this paper, a novel dual hop Decode-and-Forward (DF) relay assisted deeply integrated Power Line Communications (PLC) - Visible Light Communications (VLC) system is proposed. The PLC link is assumed to be affected by Log-Normal fading and additive background and impulsive noises whereas the channel characteristics of the VLC link are analyzed statistically as a function of the randomness of the position of the end users. In this study, novel closed form expressions of the cumulative distribution function (CDF) of the equivalent end to end signal-to-noise ratio (SNR) are derived. Also, we analyze the performance of the system in terms of the user outage probability to maintain Quality of Service (QoS).","PeriodicalId":121544,"journal":{"name":"2018 Twenty Fourth National Conference on Communications (NCC)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121106190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2018 Twenty Fourth National Conference on Communications (NCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1