Cloud manufacturing employs some progressive issues, for example, the ideas of cloud computing. It extends the "Software as a Service" concept to "Manufacture as a Service", sharing the "manufacturing resources and manufacturing capability". Access control prevents illegal operations effectively by monitoring the user's behavior. This paper proposes an access control model for the cloud manufacturing environment that called WRBAC. Considering the architectures and characteristics of cloud manufacturing, the model uses layered structure to achieve the system-level access control. Based on ABAC, RBAC and TBAC, the model introduces workflow to achieve the process automation. During the mapping between tasks and services, access permission is controlled by distributed policy conditions. In order to strengthen the cross-domain cooperation access protection, this paper refines the authorization mechanism by using attributes and mirror roles. WRBAC can effectively guarantee the security of cloud manufacturing cross-domain environment. The model has strong adaptability and pertinence.
{"title":"Workflow and Role Based Access Control Model for Cloud Manufacturing","authors":"Xianhui Lin, Xiaomei Zhang","doi":"10.1109/DASC.2013.39","DOIUrl":"https://doi.org/10.1109/DASC.2013.39","url":null,"abstract":"Cloud manufacturing employs some progressive issues, for example, the ideas of cloud computing. It extends the \"Software as a Service\" concept to \"Manufacture as a Service\", sharing the \"manufacturing resources and manufacturing capability\". Access control prevents illegal operations effectively by monitoring the user's behavior. This paper proposes an access control model for the cloud manufacturing environment that called WRBAC. Considering the architectures and characteristics of cloud manufacturing, the model uses layered structure to achieve the system-level access control. Based on ABAC, RBAC and TBAC, the model introduces workflow to achieve the process automation. During the mapping between tasks and services, access permission is controlled by distributed policy conditions. In order to strengthen the cross-domain cooperation access protection, this paper refines the authorization mechanism by using attributes and mirror roles. WRBAC can effectively guarantee the security of cloud manufacturing cross-domain environment. The model has strong adaptability and pertinence.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127063871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aiming at the problem of higher memory consumption and lower execution efficiency during the dynamic detecting to C/C++ programs memory vulnerabilities, this paper presents a dynamic detection method called ISC. The ISC improves the Safe-C using pointer analysis technology. Firstly, the ISC defines a simple and efficient fat pointer representation instead of the safe pointer in the Safe-C. Furthermore, the ISC uses the unification-based analysis algorithm with one level flow static pointer. This identification reduces the number of pointers that need to be converted to fat pointers. Then in the process of program running, the ISC detects memory vulnerabilities through constantly inspecting the attributes of fat pointers. Experimental results indicate that the ISC could detect memory vulnerabilities such as buffer overflows and dangling pointers. Comparing with the Safe-C, the ISC dramatically reduces the memory consumption and lightly improves the execution efficiency.
{"title":"A Dynamic Detection Method to C/C++ Programs Memory Vulnerabilities Based on Pointer Analysis","authors":"Rui Ma, Lingkui Chen, Changzhen Hu, Jingfeng Xue, Xiaolin Zhao","doi":"10.1109/DASC.2013.37","DOIUrl":"https://doi.org/10.1109/DASC.2013.37","url":null,"abstract":"Aiming at the problem of higher memory consumption and lower execution efficiency during the dynamic detecting to C/C++ programs memory vulnerabilities, this paper presents a dynamic detection method called ISC. The ISC improves the Safe-C using pointer analysis technology. Firstly, the ISC defines a simple and efficient fat pointer representation instead of the safe pointer in the Safe-C. Furthermore, the ISC uses the unification-based analysis algorithm with one level flow static pointer. This identification reduces the number of pointers that need to be converted to fat pointers. Then in the process of program running, the ISC detects memory vulnerabilities through constantly inspecting the attributes of fat pointers. Experimental results indicate that the ISC could detect memory vulnerabilities such as buffer overflows and dangling pointers. Comparing with the Safe-C, the ISC dramatically reduces the memory consumption and lightly improves the execution efficiency.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124700303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The motion capture technologies have been widely used in the following areas: human movement science, human-computer interaction and control, medical analysis, film, game production, and etc. This paper presented a motion capture system based on inertial sensors. The system is mainly composed of the inertial sensor unit and real-time monitoring unit on PC. Meanwhile, Sensor units exchange data with PC through BSN (body sensor network). One sensor measurement unit contains a three-axis gyroscope, a three-axis accelerometer, a three-axis magnetometer and a network communication unit. The inertial sensor units are installed on the different parts of body. In the system, the inertial sensor data are collected, and then adaptive Kalman Filter algorithm is used to estimate the body gesture. The Experiments show that this way have some advantages such as: high precision, dynamic, and almost no drift. Furthermore, the data can be changed smoothly.
{"title":"The Research of Motion Capture Technology Based on Inertial Measurement","authors":"Bo Feng, Xianggang Zhang, Hui-yuan Zhao","doi":"10.1109/DASC.2013.69","DOIUrl":"https://doi.org/10.1109/DASC.2013.69","url":null,"abstract":"The motion capture technologies have been widely used in the following areas: human movement science, human-computer interaction and control, medical analysis, film, game production, and etc. This paper presented a motion capture system based on inertial sensors. The system is mainly composed of the inertial sensor unit and real-time monitoring unit on PC. Meanwhile, Sensor units exchange data with PC through BSN (body sensor network). One sensor measurement unit contains a three-axis gyroscope, a three-axis accelerometer, a three-axis magnetometer and a network communication unit. The inertial sensor units are installed on the different parts of body. In the system, the inertial sensor data are collected, and then adaptive Kalman Filter algorithm is used to estimate the body gesture. The Experiments show that this way have some advantages such as: high precision, dynamic, and almost no drift. Furthermore, the data can be changed smoothly.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131233072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recently, there has been increasing interest in using mobile robots within spaces where humans reside, and safe navigation by effective sensing becomes an important issue. In this paper, we describe a method to detect moving objects that exist in front of an autonomously navigating robot by analyzing images of a monocular color camera mounted on the robot. In particular, detecting humans who walk in a direction opposite to the robot's motion is studied because this increases the danger of collision between the pedestrians and the robot. Although moving object detection and obstacle avoidance have been actively studied in the fields of computer vision and intelligent robotics, respectively, analyzing the images of a moving camera is still challenging. One method presented in this paper is based on comparing the current image and a past image in order to find moving objects in the scene. Assuming that the speed of the robot is known, a correspondence between a certain part of the current image and a matching part of a past image is established. Approaching objects can then be detected for a case in which the degree of mismatch between the two corresponding image parts is high. Another method we employ is the detection of human faces. Since a human face has unique features in color and shape, we can search faces in images in order to detect approaching humans. We propose a fast and simple masking method for face detection in a small search region specified from appearance-based foot detection. These two proposed methods were combined to effectively find approaching humans in our experiments. We could get promising test results.
{"title":"Moving Object's Detect in a Monocular Moving Camera","authors":"Ye-gang Chen, Xiao-rong Diao","doi":"10.1109/DASC.2013.96","DOIUrl":"https://doi.org/10.1109/DASC.2013.96","url":null,"abstract":"Recently, there has been increasing interest in using mobile robots within spaces where humans reside, and safe navigation by effective sensing becomes an important issue. In this paper, we describe a method to detect moving objects that exist in front of an autonomously navigating robot by analyzing images of a monocular color camera mounted on the robot. In particular, detecting humans who walk in a direction opposite to the robot's motion is studied because this increases the danger of collision between the pedestrians and the robot. Although moving object detection and obstacle avoidance have been actively studied in the fields of computer vision and intelligent robotics, respectively, analyzing the images of a moving camera is still challenging. One method presented in this paper is based on comparing the current image and a past image in order to find moving objects in the scene. Assuming that the speed of the robot is known, a correspondence between a certain part of the current image and a matching part of a past image is established. Approaching objects can then be detected for a case in which the degree of mismatch between the two corresponding image parts is high. Another method we employ is the detection of human faces. Since a human face has unique features in color and shape, we can search faces in images in order to detect approaching humans. We propose a fast and simple masking method for face detection in a small search region specified from appearance-based foot detection. These two proposed methods were combined to effectively find approaching humans in our experiments. We could get promising test results.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116118370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Though there is still a heated discussion on what is cyber-physical systems, CPS is complex system which combines continuous dynamics and discrete dynamics. Among all the unsolved problems, time constraints are critical issues for CPS especially the time-security issues. The interaction of continuous and discrete dynamics in CPS must be specified correctly due to this reason. Unfortunately, the existed methods for modeling CPS can't fullfill the requirements. Clock Theory, which is proposed by Jifeng He, can be used to specify the time constraints for dynamics of CPS. In this paper, we introduced Clock Theory and proposed case studies for specifying and modeling the time constraints of CPS with Clock Theory.
{"title":"A Clock Based Framework for Specifying and Modeling the Time Constraints of Cyber Physical Systems","authors":"Bingqing Xu, Lichen Zhang","doi":"10.1109/DASC.2013.77","DOIUrl":"https://doi.org/10.1109/DASC.2013.77","url":null,"abstract":"Though there is still a heated discussion on what is cyber-physical systems, CPS is complex system which combines continuous dynamics and discrete dynamics. Among all the unsolved problems, time constraints are critical issues for CPS especially the time-security issues. The interaction of continuous and discrete dynamics in CPS must be specified correctly due to this reason. Unfortunately, the existed methods for modeling CPS can't fullfill the requirements. Clock Theory, which is proposed by Jifeng He, can be used to specify the time constraints for dynamics of CPS. In this paper, we introduced Clock Theory and proposed case studies for specifying and modeling the time constraints of CPS with Clock Theory.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126014339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hongzhe Liu, Yulong Xi, Wei Song, Kyhyun Um, Kyungeun Cho
Since the birth of Natural User Interface (NUI) concept, the NUI has become widely used. NUI-based applications have grown rapidly, particularly those using gestures, which have come to occupy a pivotal place in technology. The ever-popular Smartphone is one of the best examples. Recently, video conferencing has also begun adopting gesture-based NUIs with augmented reality (AR) technology. The NUI and AR have greatly enriched and facilitated human experience. In addition, path planning has been a popular topic in research area. Traditional path planning uses automatic navigation to solve problems, it cannot practically interact with people. Its algorithm calculates complexly, moreover, in certain extenuating circumstances, automatic real-time processing is much less efficient than human path modification. Therefore, considering such extenuating circumstances, we present a solution that employs NUI technology for 3D path modification in real time. In our proposed solution, users can manually operate and edit their own paths. The core method is based on 3D point detection to change paths. We did a simulation experiment about city path modification. Experiment resulted that computer can accurately identify a valid gesture. By using gesture it can effectively change the path. Among other applications, this solution can be used in virtual military maps and car navigation.
{"title":"Gesture-Based NUI Application for Real-Time Path Modification","authors":"Hongzhe Liu, Yulong Xi, Wei Song, Kyhyun Um, Kyungeun Cho","doi":"10.1109/DASC.2013.104","DOIUrl":"https://doi.org/10.1109/DASC.2013.104","url":null,"abstract":"Since the birth of Natural User Interface (NUI) concept, the NUI has become widely used. NUI-based applications have grown rapidly, particularly those using gestures, which have come to occupy a pivotal place in technology. The ever-popular Smartphone is one of the best examples. Recently, video conferencing has also begun adopting gesture-based NUIs with augmented reality (AR) technology. The NUI and AR have greatly enriched and facilitated human experience. In addition, path planning has been a popular topic in research area. Traditional path planning uses automatic navigation to solve problems, it cannot practically interact with people. Its algorithm calculates complexly, moreover, in certain extenuating circumstances, automatic real-time processing is much less efficient than human path modification. Therefore, considering such extenuating circumstances, we present a solution that employs NUI technology for 3D path modification in real time. In our proposed solution, users can manually operate and edit their own paths. The core method is based on 3D point detection to change paths. We did a simulation experiment about city path modification. Experiment resulted that computer can accurately identify a valid gesture. By using gesture it can effectively change the path. Among other applications, this solution can be used in virtual military maps and car navigation.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126720363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The current network emulators commonly have bad versatility and their emulation fidelity is not high. Based on the principle of network emulation, this essay designs and implements a network path quality indicators emulation system, which can be transparently series deployed on a network path and change the performance of this path. The main tasks are: achieves a "Transparent Bridge" on Windows platform, using WinPcap packet capturer, gives the quality indicators emulation algorithms and models, studies the relationships between the indicators of network quality and the emulation algorithms has been improved and optimized based on this, designs, implements and verifies the emulation system. The emulation system has good cross-platform features, it achieves the frame-level emulation in the link layer, so it has a high fidelity.
{"title":"Emulation of Network Path Quality Indicators","authors":"Ruijie Ou, Wenyu Chen, WeiShun Li, LinLi Guo","doi":"10.1109/DASC.2013.91","DOIUrl":"https://doi.org/10.1109/DASC.2013.91","url":null,"abstract":"The current network emulators commonly have bad versatility and their emulation fidelity is not high. Based on the principle of network emulation, this essay designs and implements a network path quality indicators emulation system, which can be transparently series deployed on a network path and change the performance of this path. The main tasks are: achieves a \"Transparent Bridge\" on Windows platform, using WinPcap packet capturer, gives the quality indicators emulation algorithms and models, studies the relationships between the indicators of network quality and the emulation algorithms has been improved and optimized based on this, designs, implements and verifies the emulation system. The emulation system has good cross-platform features, it achieves the frame-level emulation in the link layer, so it has a high fidelity.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125883400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper presents a distributed real-time operating system (DRTOS) that provides a distributed shared memory (DSM) service for distributed control systems. Model-based design has become popular in embedded control software design and the source code of software modules can be generated from a controller model. The generated software modules exchange their input and output values through shared variables. We develop a DRTOS with a real-time DSM service to provide a location-transparent environment, in which distributed software modules can exchange input and output values through the DSM. The DRTOS is an extension to OSEK OS. We use a real-time network called FlexRay, which is based on a TDMA (Time Division Multiple Access) protocol. The consistency of the DSM is maintained according to the order of data transfer through FlexRay, not using inter-node synchronization. The worst case response time of the DSM is predictable if the FlexRay communication is well configured.
{"title":"A Distributed Real-Time Operating System with Distributed Shared Memory for Embedded Control Systems","authors":"Takahiro Chiba, Myungryun Yoo, T. Yokoyama","doi":"10.1109/DASC.2013.71","DOIUrl":"https://doi.org/10.1109/DASC.2013.71","url":null,"abstract":"The paper presents a distributed real-time operating system (DRTOS) that provides a distributed shared memory (DSM) service for distributed control systems. Model-based design has become popular in embedded control software design and the source code of software modules can be generated from a controller model. The generated software modules exchange their input and output values through shared variables. We develop a DRTOS with a real-time DSM service to provide a location-transparent environment, in which distributed software modules can exchange input and output values through the DSM. The DRTOS is an extension to OSEK OS. We use a real-time network called FlexRay, which is based on a TDMA (Time Division Multiple Access) protocol. The consistency of the DSM is maintained according to the order of data transfer through FlexRay, not using inter-node synchronization. The worst case response time of the DSM is predictable if the FlexRay communication is well configured.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114965596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the evolution of traditional civil aviation into "e-enabled" aviation, automatic dependent surveillance-broadcast (ADS-B) system plays an important role to replace radar to become the cornerstone of the next generation air traffic management. However, ADS-B system is a broadcast-type data link and ADS-B signals are unauthenticated, thus inserting a false aircraft into the ADS-B system is easy. In this paper, to filter spoofed targets, we present ADS-B data authentication scheme based on AH protocol. Security analysis demonstrates that the proposed scheme can achieve integrity of ADS-B messages, authenticity of data origin sources and resistance against replay attacks.
{"title":"ADS-B Data Authentication Based on AH Protocol","authors":"Rui-dong Chen, Chengxiang Si, Haomiao Yang, Xiaosong Zhang","doi":"10.1109/DASC.2013.32","DOIUrl":"https://doi.org/10.1109/DASC.2013.32","url":null,"abstract":"With the evolution of traditional civil aviation into \"e-enabled\" aviation, automatic dependent surveillance-broadcast (ADS-B) system plays an important role to replace radar to become the cornerstone of the next generation air traffic management. However, ADS-B system is a broadcast-type data link and ADS-B signals are unauthenticated, thus inserting a false aircraft into the ADS-B system is easy. In this paper, to filter spoofed targets, we present ADS-B data authentication scheme based on AH protocol. Security analysis demonstrates that the proposed scheme can achieve integrity of ADS-B messages, authenticity of data origin sources and resistance against replay attacks.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130094733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Multiple input multiple output (MIMO) technology has been considered as one of the essential technologies to enhance the performance of Long Term Evolution (LTE) system with the limited bandwidth and transmit power. For indoor coverage, it is difficult to implement MIMO technology since the challenges of engineering and cost in doubling the number of installed antennas and feeders. Therefore, two indoor MIMO distributed antenna system (DAS) solutions are proposed by using frequency converting and signal comibing and separating by upgrading the existing indoor DASs. Frequency converting is employed to decrease the carrier frequency of LTE system when it is higher than 2500MHz since most of the existing feeders can only support the frequency of the transmit signals from 800MHz to 2500MHz. In the proposed schemes, two branches' MIMO signals can be loaded into the feeder of the existing DAS by combining them together after converting the original LTE frequency into two different lower frequency bands, and a dual-polarized indoor antenna is used at remote site to reduce the number of antenna locations. Some simulations show the effect of difference on transmit power and time delay between two LTE MIMO branches. Our field measurement results reveal that the proposed schemes can provide the comparable level of performance but more simpler and pratical to be deployed.
{"title":"MIMO DAS Solutions in LTE Indoor System","authors":"Youxiang Wang, Fuchang Li","doi":"10.1109/DASC.2013.112","DOIUrl":"https://doi.org/10.1109/DASC.2013.112","url":null,"abstract":"Multiple input multiple output (MIMO) technology has been considered as one of the essential technologies to enhance the performance of Long Term Evolution (LTE) system with the limited bandwidth and transmit power. For indoor coverage, it is difficult to implement MIMO technology since the challenges of engineering and cost in doubling the number of installed antennas and feeders. Therefore, two indoor MIMO distributed antenna system (DAS) solutions are proposed by using frequency converting and signal comibing and separating by upgrading the existing indoor DASs. Frequency converting is employed to decrease the carrier frequency of LTE system when it is higher than 2500MHz since most of the existing feeders can only support the frequency of the transmit signals from 800MHz to 2500MHz. In the proposed schemes, two branches' MIMO signals can be loaded into the feeder of the existing DAS by combining them together after converting the original LTE frequency into two different lower frequency bands, and a dual-polarized indoor antenna is used at remote site to reduce the number of antenna locations. Some simulations show the effect of difference on transmit power and time delay between two LTE MIMO branches. Our field measurement results reveal that the proposed schemes can provide the comparable level of performance but more simpler and pratical to be deployed.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129433551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}