Pub Date : 2013-10-21DOI: 10.1109/WoWMoM.2013.6583385
P. Ostovari, Jie Wu, Abdallah Khreishah
Providing reliable transmission over error-prone networks has received a lot of attention from the research community. In this paper, instead of using simple retransmissions to provide reliability, we consider a novel retransmission approach based on the importance of the bits (symbols). We study the problem of maximizing the total gain in the case of partial data delivery in error-prone wireless networks, in which each set of bits (symbols) has a different weight. We first address the case of one-hop single packet transmission, and prove that the optimal solution has a round-robin transmission pattern. Then, we extend our solution to the case of multiple packets. We also enhance the expected gain using random linear network coding. Our simulation results show that our proposed multiple packets transmission mechanism can increase the gain up to 60% compared to that of a simple retransmission. Moreover, our network coding scheme enhances the expected total gain up to 15% compared to our non-coding mechanism.
{"title":"Efficient symbol-level transmission in error-prone wireless networks","authors":"P. Ostovari, Jie Wu, Abdallah Khreishah","doi":"10.1109/WoWMoM.2013.6583385","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583385","url":null,"abstract":"Providing reliable transmission over error-prone networks has received a lot of attention from the research community. In this paper, instead of using simple retransmissions to provide reliability, we consider a novel retransmission approach based on the importance of the bits (symbols). We study the problem of maximizing the total gain in the case of partial data delivery in error-prone wireless networks, in which each set of bits (symbols) has a different weight. We first address the case of one-hop single packet transmission, and prove that the optimal solution has a round-robin transmission pattern. Then, we extend our solution to the case of multiple packets. We also enhance the expected gain using random linear network coding. Our simulation results show that our proposed multiple packets transmission mechanism can increase the gain up to 60% compared to that of a simple retransmission. Moreover, our network coding scheme enhances the expected total gain up to 15% compared to our non-coding mechanism.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129344392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-08-22DOI: 10.1109/WoWMoM.2013.6583433
M. Alshamrani
Most of the Future Internet users will be wirelessly connected to IP clouds through different types of wireless networks. Thus, the number of applications and devices will be increased, and IPv6 insists to be applied. Voice over IP (VoIP) is one of the most popular Internet applications which provide real time voice communications between different parties and network systems. The Quality of Service (QoS) for VoIP influenced by the performance metrics which are signaling, bandwidth, packet loss, delay, and jitter. The signaling is the main parameter that manages and controls VoIP calls. One of the most efficient signaling systems for VoIP is the Session Initiation Protocol (SIP). MANETs consist of changeable bandwidth with considerable delays which affects the VoIP QoS. The first stage of my PhD research is to evaluate the performance metrics of the SIP based VoIP applications over IPv6 MANET using OPNET modeler with different voice Codecs and Mobility Models. The evaluation results showed considerable differences in the performance of the real-time applications between different MANET routing protocols. In conclusion, SIP acts poorly in IPv6, and both SIP signaling and IPv6 need to be enhanced for real time applications over MANET.
{"title":"SIP over Next Generation mobile ad hoc networks (MANETs)","authors":"M. Alshamrani","doi":"10.1109/WoWMoM.2013.6583433","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583433","url":null,"abstract":"Most of the Future Internet users will be wirelessly connected to IP clouds through different types of wireless networks. Thus, the number of applications and devices will be increased, and IPv6 insists to be applied. Voice over IP (VoIP) is one of the most popular Internet applications which provide real time voice communications between different parties and network systems. The Quality of Service (QoS) for VoIP influenced by the performance metrics which are signaling, bandwidth, packet loss, delay, and jitter. The signaling is the main parameter that manages and controls VoIP calls. One of the most efficient signaling systems for VoIP is the Session Initiation Protocol (SIP). MANETs consist of changeable bandwidth with considerable delays which affects the VoIP QoS. The first stage of my PhD research is to evaluate the performance metrics of the SIP based VoIP applications over IPv6 MANET using OPNET modeler with different voice Codecs and Mobility Models. The evaluation results showed considerable differences in the performance of the real-time applications between different MANET routing protocols. In conclusion, SIP acts poorly in IPv6, and both SIP signaling and IPv6 need to be enhanced for real time applications over MANET.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129923886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-04DOI: 10.1109/WOWMOM.2013.6583447
V. Talooki, Hugo Marques, Jonathan Rodriguez
In Mobile Ad hoc NETworks (MANETs), where cooperative behaviour is mandatory, there is a high probability for some nodes to become overloaded with packet forwarding operations, in order to support neighbour data exchange. This altruistic behaviour leads to an unbalanced load in terms of traffic and energy consumption. In such scenarios, mobile nodes can benefit from the use of an energy efficient and traffic fitting routing protocol, that better complies with their limited battery capacity and throughput. This paper presents E2DYMO, an improvement to the well-known DYMO protocol that offers energy efficiency and fairness in routing for mobile wireless ad hoc networks. With this proposed improvement, nodes are able to find several routes per each pair of source and destination nodes and select the best route according to energy and traffic parameters, effectively extending the lifespan of the network.
{"title":"Energy efficient dynamic MANET on-demand (E2DYMO) routing protocol","authors":"V. Talooki, Hugo Marques, Jonathan Rodriguez","doi":"10.1109/WOWMOM.2013.6583447","DOIUrl":"https://doi.org/10.1109/WOWMOM.2013.6583447","url":null,"abstract":"In Mobile Ad hoc NETworks (MANETs), where cooperative behaviour is mandatory, there is a high probability for some nodes to become overloaded with packet forwarding operations, in order to support neighbour data exchange. This altruistic behaviour leads to an unbalanced load in terms of traffic and energy consumption. In such scenarios, mobile nodes can benefit from the use of an energy efficient and traffic fitting routing protocol, that better complies with their limited battery capacity and throughput. This paper presents E2DYMO, an improvement to the well-known DYMO protocol that offers energy efficiency and fairness in routing for mobile wireless ad hoc networks. With this proposed improvement, nodes are able to find several routes per each pair of source and destination nodes and select the best route according to energy and traffic parameters, effectively extending the lifespan of the network.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117214266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-04DOI: 10.1109/WoWMoM.2013.6583464
M. Werner, J. Kaiser, M. Hollick, Elias Weingärtner, Klaus Wehrle
A plethora of (secure) routing protocols exists for wireless multihop networks. These protocols are mostly tailored to meet the performance and security requirements of specific application scenarios. As a result, the protocols cannot easily be adapted to novel application demands, organically growing networks, etc. We argue that the modular design of routing protocols and security mechanisms can remove the key limitations of today's monolithic routing protocols. We show the feasibility of a modular routing approach for wireless multihop networks using the example of a wireless mesh network. In particular, we demonstrate that a dynamic switch between protocol modules is possible at runtime by means of simulation as well as testbed experimentation. We further demonstrate that the security associations and the key material can be reutilized for bootstrapping novel protocol modules, thus minimizing the control overhead.
{"title":"A blueprint for switching between secure routing protocols in wireless multihop networks","authors":"M. Werner, J. Kaiser, M. Hollick, Elias Weingärtner, Klaus Wehrle","doi":"10.1109/WoWMoM.2013.6583464","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583464","url":null,"abstract":"A plethora of (secure) routing protocols exists for wireless multihop networks. These protocols are mostly tailored to meet the performance and security requirements of specific application scenarios. As a result, the protocols cannot easily be adapted to novel application demands, organically growing networks, etc. We argue that the modular design of routing protocols and security mechanisms can remove the key limitations of today's monolithic routing protocols. We show the feasibility of a modular routing approach for wireless multihop networks using the example of a wireless mesh network. In particular, we demonstrate that a dynamic switch between protocol modules is possible at runtime by means of simulation as well as testbed experimentation. We further demonstrate that the security associations and the key material can be reutilized for bootstrapping novel protocol modules, thus minimizing the control overhead.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127149601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-04DOI: 10.1109/WoWMoM.2013.6583459
Fei Peng, Nan Wang, Yue Gao, L. Cuthbert, Xing Zhang
Interference mitigation between femtocells and the surrounding macrocells is one of the major challenges in femtocell deployment. This paper proposes a system architecture of using TV White Space (TVWS) in LTE femtocell networks, which includes: (i) a Geo-location database to obtain locally available TVWS information, and (ii) a new resource allocation scheme using the locally available TVWS to mitigate the downlink cross-tier interference between macrocell users and nearby femtocells. A two-tier multi-femtocell simulator is established to demonstrate the system performance. Simulations at different scenarios are conducted to compare the performance of the traditional all-shared resource allocation scheme, dynamic resource partitioning scheme and the proposed scheme. Simulation results show that the proposed scheme has better downlink interference mitigation performance in comparison with the other two schemes.
{"title":"Geo-location database based TV white space for interference mitigation in LTE femtocell networks","authors":"Fei Peng, Nan Wang, Yue Gao, L. Cuthbert, Xing Zhang","doi":"10.1109/WoWMoM.2013.6583459","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583459","url":null,"abstract":"Interference mitigation between femtocells and the surrounding macrocells is one of the major challenges in femtocell deployment. This paper proposes a system architecture of using TV White Space (TVWS) in LTE femtocell networks, which includes: (i) a Geo-location database to obtain locally available TVWS information, and (ii) a new resource allocation scheme using the locally available TVWS to mitigate the downlink cross-tier interference between macrocell users and nearby femtocells. A two-tier multi-femtocell simulator is established to demonstrate the system performance. Simulations at different scenarios are conducted to compare the performance of the traditional all-shared resource allocation scheme, dynamic resource partitioning scheme and the proposed scheme. Simulation results show that the proposed scheme has better downlink interference mitigation performance in comparison with the other two schemes.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125951463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-04DOI: 10.1109/WoWMoM.2013.6583391
Razvan Stanica, M. Fiore, F. Malandrino
Floating Car Data (FCD) is currently collected by moving vehicles and uploaded to Internet-based processing centers through the cellular access infrastructure. As FCD is foreseen to rapidly become a pervasive technology, the present network paradigm risks not to scale well in the future, when a vast majority of automobiles will be constantly sensing their operation as well as the external environment and transmitting such information towards the Internet. In order to relieve the cellular network from the additional load that widespread FCD can induce, we study a local gathering and fusion paradigm, based on vehicle-to-vehicle (V2V) communication. We show how this approach can lead to significant gain, especially when and where the cellular network is stressed the most. Moreover, we propose several distributed schemes to FCD offloading based on the principle above that, despite their simplicity, are extremely efficient and can reduce the FCD capacity demand at the access network by up to 95%.
{"title":"Offloading Floating Car Data","authors":"Razvan Stanica, M. Fiore, F. Malandrino","doi":"10.1109/WoWMoM.2013.6583391","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583391","url":null,"abstract":"Floating Car Data (FCD) is currently collected by moving vehicles and uploaded to Internet-based processing centers through the cellular access infrastructure. As FCD is foreseen to rapidly become a pervasive technology, the present network paradigm risks not to scale well in the future, when a vast majority of automobiles will be constantly sensing their operation as well as the external environment and transmitting such information towards the Internet. In order to relieve the cellular network from the additional load that widespread FCD can induce, we study a local gathering and fusion paradigm, based on vehicle-to-vehicle (V2V) communication. We show how this approach can lead to significant gain, especially when and where the cellular network is stressed the most. Moreover, we propose several distributed schemes to FCD offloading based on the principle above that, despite their simplicity, are extremely efficient and can reduce the FCD capacity demand at the access network by up to 95%.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"41 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126138065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-04DOI: 10.4018/ijaci.2014010104
Sean Carlin, K. Curran
Indoor radio frequency tracking systems are generally quite expensive and can vary in accuracy due to interference, equipment quality or other environmental factors. Due to these limiting factors of the technology, many businesses today find it hard to justify investing in RFID tracking technologies to improve the safety, efficiency and security of their working environments. The aim of this project was to provide a budget RFID tracking system that was capable of tracking a person or object through an indoor environment. To minimize the cost of the RFID tracking system, the components of the system were built from existing electronic equipment and hardware. The software was also written to minimize licensing and support fees allowing a cost effective budget RFID tracking system to be developed. The tracking system consists of a tag, reader nodes and a PC reader which utilize synapse RF 100 engines with python scripts embedded on to the chips.
{"title":"An active low cost mesh networking indoor tracking system","authors":"Sean Carlin, K. Curran","doi":"10.4018/ijaci.2014010104","DOIUrl":"https://doi.org/10.4018/ijaci.2014010104","url":null,"abstract":"Indoor radio frequency tracking systems are generally quite expensive and can vary in accuracy due to interference, equipment quality or other environmental factors. Due to these limiting factors of the technology, many businesses today find it hard to justify investing in RFID tracking technologies to improve the safety, efficiency and security of their working environments. The aim of this project was to provide a budget RFID tracking system that was capable of tracking a person or object through an indoor environment. To minimize the cost of the RFID tracking system, the components of the system were built from existing electronic equipment and hardware. The software was also written to minimize licensing and support fees allowing a cost effective budget RFID tracking system to be developed. The tracking system consists of a tag, reader nodes and a PC reader which utilize synapse RF 100 engines with python scripts embedded on to the chips.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123312224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-04DOI: 10.1109/WoWMoM.2013.6583429
L. Atapattu
The methodology undertaken, the channel model and the system model created for developing a novel adaptive equalization method and a novel channel tracking method for uplink of MU-MIMO-OFDM systems is presented in this paper. The results show that the channel tracking method works with 97% accuracy, while the training-based initial channel estimation method shows poor performance in estimating the actual channel comparatively.
{"title":"Novel channel tracking and equalization methods in MU-MIMO-OFDM systems","authors":"L. Atapattu","doi":"10.1109/WoWMoM.2013.6583429","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583429","url":null,"abstract":"The methodology undertaken, the channel model and the system model created for developing a novel adaptive equalization method and a novel channel tracking method for uplink of MU-MIMO-OFDM systems is presented in this paper. The results show that the channel tracking method works with 97% accuracy, while the training-based initial channel estimation method shows poor performance in estimating the actual channel comparatively.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114390928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-04DOI: 10.1109/WoWMoM.2013.6583398
Oscar Puñal, Hanzhi Zhang, J. Gross
Rate adaptation in vehicular networks is known to be more challenging than in WLANs due to the high mobility of stations. Nevertheless, vehicular networks are subject to certain recurring patterns particularly if stations communicate to roadside units. This has lead to the proposal of learning-based rate adaptation schemes which are trained for a certain propagation environment. In general, these schemes outperform other approaches at the price of being specific for a particular environment. In this paper we present RFRA, a novel rate adaptation scheme for vehicular networks. It is based on the machine-learning algorithm Random Forests which is known to be superior to most other learning approaches. Firstly, we show that RFRA outperforms other learning-based methods significantly. We also study the question how sensitive RFRA is to changes of the learned environment, especially with respect to the propagation characteristics. We show that, although this reduces the gain of our scheme, RFRA still provides a much higher performance than state-of-the-art rate adaptation schemes.
{"title":"RFRA: Random Forests Rate Adaptation for vehicular networks","authors":"Oscar Puñal, Hanzhi Zhang, J. Gross","doi":"10.1109/WoWMoM.2013.6583398","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583398","url":null,"abstract":"Rate adaptation in vehicular networks is known to be more challenging than in WLANs due to the high mobility of stations. Nevertheless, vehicular networks are subject to certain recurring patterns particularly if stations communicate to roadside units. This has lead to the proposal of learning-based rate adaptation schemes which are trained for a certain propagation environment. In general, these schemes outperform other approaches at the price of being specific for a particular environment. In this paper we present RFRA, a novel rate adaptation scheme for vehicular networks. It is based on the machine-learning algorithm Random Forests which is known to be superior to most other learning approaches. Firstly, we show that RFRA outperforms other learning-based methods significantly. We also study the question how sensitive RFRA is to changes of the learned environment, especially with respect to the propagation characteristics. We show that, although this reduces the gain of our scheme, RFRA still provides a much higher performance than state-of-the-art rate adaptation schemes.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117008210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-04DOI: 10.1109/WoWMoM.2013.6583468
Özge Cepheli, Günes Karabulut-Kurt
Beamforming and artificial noise (AN) are two major techniques to maintain physical (PHY) layer security. Using AN to degrade eavesdroppers' signal reception enables data secrecy with less power compared to no-AN scenarios. Existing AN approaches make use of the spatial selectivity of the wireless channel however these techniques do not consider the associated signal structure. In this paper we extend the existing AN techniques to MIMO-OFDM, where we prove that the optimization problem can be inverted to a convex form in multi-antenna, multi-carrier systems, hence show that convex optimization can still be applied to preserve privacy. Furthermore, inspired by the fact that pilot symbols are critical in error-free the reception of the information symbols, we propose a spatiotemporal selective AN approach that can make use of both the space and time selectivity, as our main contribution. We also show that our proposed method can cause extensive channel estimation error for eavesdroppers and achieves significant transmission power savings at the same time.
{"title":"Efficient PHY layer security in MIMO-OFDM: Spatiotemporal selective artificial noise","authors":"Özge Cepheli, Günes Karabulut-Kurt","doi":"10.1109/WoWMoM.2013.6583468","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583468","url":null,"abstract":"Beamforming and artificial noise (AN) are two major techniques to maintain physical (PHY) layer security. Using AN to degrade eavesdroppers' signal reception enables data secrecy with less power compared to no-AN scenarios. Existing AN approaches make use of the spatial selectivity of the wireless channel however these techniques do not consider the associated signal structure. In this paper we extend the existing AN techniques to MIMO-OFDM, where we prove that the optimization problem can be inverted to a convex form in multi-antenna, multi-carrier systems, hence show that convex optimization can still be applied to preserve privacy. Furthermore, inspired by the fact that pilot symbols are critical in error-free the reception of the information symbols, we propose a spatiotemporal selective AN approach that can make use of both the space and time selectivity, as our main contribution. We also show that our proposed method can cause extensive channel estimation error for eavesdroppers and achieves significant transmission power savings at the same time.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117082419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}