首页 > 最新文献

2017 Wireless Days最新文献

英文 中文
A named data approach for DTN routing DTN路由的命名数据方法
Pub Date : 2017-03-29 DOI: 10.1109/WD.2017.7918135
Yaoxing Li, Yuhong Li, L. Wolf, Anders Lindgren, Ji Wang
Many common DTN routing protocols are replication-based, which have relatively good performance in terms of message delivery ratio but high overhead, and leave the issue of garbage collection open. In this paper, we propose Named Data Distance Routing (NDDR), a named data based DTN routing approach which makes routing decisions for named data based on topological distance information. This helps to reduce the overhead of routing. We have implemented NDDR in the ONE simulation environment and the simulation results show that the proposed routing method has better performance in terms of message delivery ratio and network overhead compared with several typical replication-based DTN routing protocols.
许多常见的DTN路由协议都是基于复制的,在消息传递率方面具有相对较好的性能,但开销较高,并且存在垃圾收集问题。本文提出了命名数据距离路由(NDDR),这是一种基于命名数据的DTN路由方法,它根据拓扑距离信息对命名数据进行路由决策。这有助于减少路由开销。我们在ONE仿真环境中实现了NDDR,仿真结果表明,与几种典型的基于复制的DTN路由协议相比,所提出的路由方法在消息传递率和网络开销方面具有更好的性能。
{"title":"A named data approach for DTN routing","authors":"Yaoxing Li, Yuhong Li, L. Wolf, Anders Lindgren, Ji Wang","doi":"10.1109/WD.2017.7918135","DOIUrl":"https://doi.org/10.1109/WD.2017.7918135","url":null,"abstract":"Many common DTN routing protocols are replication-based, which have relatively good performance in terms of message delivery ratio but high overhead, and leave the issue of garbage collection open. In this paper, we propose Named Data Distance Routing (NDDR), a named data based DTN routing approach which makes routing decisions for named data based on topological distance information. This helps to reduce the overhead of routing. We have implemented NDDR in the ONE simulation environment and the simulation results show that the proposed routing method has better performance in terms of message delivery ratio and network overhead compared with several typical replication-based DTN routing protocols.","PeriodicalId":179998,"journal":{"name":"2017 Wireless Days","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125260993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Give me a hint: An ID-free small data transmission protocol for dense IoT devices 给我一个提示:密集物联网设备的无id小数据传输协议
Pub Date : 2017-03-29 DOI: 10.1109/WD.2017.7918126
Yi Ren, Ren-Jie Wu, Teng-Wei Huang, Y. Tseng
IoT (Internet of Things) has attracted a lot of attention recently. IoT devices need to report their data or status to base stations at various frequencies. The IoT communications observed by a base station normally exhibit the following characteristics: (1) massively connected, (2) lightly loaded per packet, and (3) periodical or at least mostly predictable. The current design principals of communication networks, when applied to IoT scenarios, however, do not fit well to these requirements. For example, an IPv6 address is 128 bits, which is much longer than a 16-bit temperature report. Also, contending to send a small packet is not cost-effective. In this work, we propose a novel framework, which is slot-based, schedule-oriented, and identity-free for uploading IoT devices' data. We show that it fits very well for IoT applications. The main idea is to bundle time slots with certain hashing functions of device IDs, thus significantly reducing transmission overheads, including device IDs and contention overheads. The framework is applicable from small-scale body-area (wearable) networks to large-scale massively connected IoT networks. Our simulation results verify that this framework is very effective for IoT small data uploading.
物联网(Internet of Things)最近引起了人们的广泛关注。物联网设备需要以不同的频率向基站报告其数据或状态。基站观察到的物联网通信通常具有以下特征:(1)大规模连接,(2)每个数据包的负载较轻,以及(3)周期性或至少大部分可预测。然而,当应用于物联网场景时,当前通信网络的设计原则并不能很好地满足这些要求。例如,IPv6地址是128位,比16位的温度报告长得多。此外,争着发送一个小数据包是不划算的。在这项工作中,我们提出了一个新的框架,该框架基于插槽,面向时间表,并且无需身份来上传物联网设备的数据。我们证明它非常适合物联网应用。其主要思想是将时隙与设备id的某些散列函数捆绑在一起,从而显著降低传输开销,包括设备id和争用开销。该框架适用于从小规模身体区域(可穿戴)网络到大规模大规模连接的物联网网络。仿真结果验证了该框架对于物联网小数据上传是非常有效的。
{"title":"Give me a hint: An ID-free small data transmission protocol for dense IoT devices","authors":"Yi Ren, Ren-Jie Wu, Teng-Wei Huang, Y. Tseng","doi":"10.1109/WD.2017.7918126","DOIUrl":"https://doi.org/10.1109/WD.2017.7918126","url":null,"abstract":"IoT (Internet of Things) has attracted a lot of attention recently. IoT devices need to report their data or status to base stations at various frequencies. The IoT communications observed by a base station normally exhibit the following characteristics: (1) massively connected, (2) lightly loaded per packet, and (3) periodical or at least mostly predictable. The current design principals of communication networks, when applied to IoT scenarios, however, do not fit well to these requirements. For example, an IPv6 address is 128 bits, which is much longer than a 16-bit temperature report. Also, contending to send a small packet is not cost-effective. In this work, we propose a novel framework, which is slot-based, schedule-oriented, and identity-free for uploading IoT devices' data. We show that it fits very well for IoT applications. The main idea is to bundle time slots with certain hashing functions of device IDs, thus significantly reducing transmission overheads, including device IDs and contention overheads. The framework is applicable from small-scale body-area (wearable) networks to large-scale massively connected IoT networks. Our simulation results verify that this framework is very effective for IoT small data uploading.","PeriodicalId":179998,"journal":{"name":"2017 Wireless Days","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121150184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Wireless Internet service providing for 5G with hybrid TV broadcast and visible light communications 无线互联网服务,为5G提供混合电视广播和可见光通信
Pub Date : 2017-03-29 DOI: 10.1109/WD.2017.7918117
B. Gulbahar, Sezgin Sencan
Visible light communications (VLC) is a potential candidate to be utilized in future 5G networks with energy efficient indoor and outdoor communications with available hardware components such as LED bulbs, TV screens and camera receivers. In this article, a low cost cellular infrastructure is proposed for Internet service providing (ISP). Hybrid TV radio frequency (RF) broadcast and display screen based VLC transmitters are utilized for the downlink while telescopes, camera receivers and LED arrays placed on the roofs of the houses are utilized for the uplink. In the downlink, display screens with quantum dot (QD), organic light emitting diode (OLED) and liquid-crystal display (LCD) technologies are compared in terms of response time, color gamut, spectral color output, contrast ratio and power consumption. Uplink capacity reaches hundreds of Kbit/s data rates for hundreds of houses at tens of kilometer distances with a simple and low cost system with less than hundred watts power consumption at each house while downlink capacity promises several Mbit/s at each house.
可见光通信(VLC)是未来5G网络中使用的潜在候选者,具有节能的室内和室外通信,可以使用LED灯泡、电视屏幕和摄像机接收器等硬件组件。本文提出了一种用于互联网服务提供(ISP)的低成本蜂窝基础设施。基于混合电视射频(RF)广播和显示屏的VLC发射器用于下行链路,而放置在房屋屋顶上的望远镜、相机接收器和LED阵列用于上行链路。在下行链路中,对采用量子点(QD)、有机发光二极管(OLED)和液晶显示(LCD)技术的显示屏在响应时间、色域、光谱颜色输出、对比度和功耗方面进行了比较。上行容量达到数百千兆比特/秒的数据速率,以一个简单和低成本的系统,在几十公里的距离上,每个家庭的功耗低于几百瓦,而下行容量承诺每个家庭的几个千兆比特/秒。
{"title":"Wireless Internet service providing for 5G with hybrid TV broadcast and visible light communications","authors":"B. Gulbahar, Sezgin Sencan","doi":"10.1109/WD.2017.7918117","DOIUrl":"https://doi.org/10.1109/WD.2017.7918117","url":null,"abstract":"Visible light communications (VLC) is a potential candidate to be utilized in future 5G networks with energy efficient indoor and outdoor communications with available hardware components such as LED bulbs, TV screens and camera receivers. In this article, a low cost cellular infrastructure is proposed for Internet service providing (ISP). Hybrid TV radio frequency (RF) broadcast and display screen based VLC transmitters are utilized for the downlink while telescopes, camera receivers and LED arrays placed on the roofs of the houses are utilized for the uplink. In the downlink, display screens with quantum dot (QD), organic light emitting diode (OLED) and liquid-crystal display (LCD) technologies are compared in terms of response time, color gamut, spectral color output, contrast ratio and power consumption. Uplink capacity reaches hundreds of Kbit/s data rates for hundreds of houses at tens of kilometer distances with a simple and low cost system with less than hundred watts power consumption at each house while downlink capacity promises several Mbit/s at each house.","PeriodicalId":179998,"journal":{"name":"2017 Wireless Days","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122590390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
ARMA based popularity prediction for caching in Content Delivery Networks 基于ARMA的内容交付网络缓存流行度预测
Pub Date : 2017-03-29 DOI: 10.1109/WD.2017.7918125
N. Hassine, R. Milocco, P. Minet
Content Delivery Networks (CDNs) are faced with an increasing and time varying demand of video contents. Their ability to promptly react to this demand is a success factor. Caching helps, but the question is: which contents to cache? Considering that the most popular contents should be cached, this paper focuses on how to predict the popularity of video contents. With real traces extracted from YouTube, we show that Auto-Regressive and Moving Average (ARMA) models can provide accurate predictions. We propose an original solution combining the predictions of several ARMA models. This solution achieves a better Hit Ratio and a smaller Update Ratio than the classical Least Frequently Used (LFU) caching technique.
内容分发网络(cdn)面临着日益增长且随时间变化的视频内容需求。他们对这种需求迅速做出反应的能力是一个成功的因素。缓存有帮助,但问题是:缓存哪些内容?考虑到需要缓存最受欢迎的内容,本文重点研究如何预测视频内容的受欢迎程度。使用从YouTube中提取的真实轨迹,我们表明自回归和移动平均(ARMA)模型可以提供准确的预测。我们提出了一个结合多个ARMA模型预测的原始解决方案。与经典的最不频繁使用(LFU)缓存技术相比,该解决方案实现了更好的命中率和更小的更新率。
{"title":"ARMA based popularity prediction for caching in Content Delivery Networks","authors":"N. Hassine, R. Milocco, P. Minet","doi":"10.1109/WD.2017.7918125","DOIUrl":"https://doi.org/10.1109/WD.2017.7918125","url":null,"abstract":"Content Delivery Networks (CDNs) are faced with an increasing and time varying demand of video contents. Their ability to promptly react to this demand is a success factor. Caching helps, but the question is: which contents to cache? Considering that the most popular contents should be cached, this paper focuses on how to predict the popularity of video contents. With real traces extracted from YouTube, we show that Auto-Regressive and Moving Average (ARMA) models can provide accurate predictions. We propose an original solution combining the predictions of several ARMA models. This solution achieves a better Hit Ratio and a smaller Update Ratio than the classical Least Frequently Used (LFU) caching technique.","PeriodicalId":179998,"journal":{"name":"2017 Wireless Days","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123432790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Analysis of the IEEE 802.11 EDCF scheme for broadcast traffic: Application for VANETs 面向广播业务的IEEE 802.11 EDCF方案分析:在vanet中的应用
Pub Date : 2017-03-29 DOI: 10.1109/WD.2017.7918156
Younes Bouchaala, P. Mühlethaler, N. Achir
In this paper we propose a model of the IEEE 802.11 Enhanced Distributed Coordination Function (EDCF) which can build different access priorities for different classes of traffic. These priorities are obtained using different inter frame spacings called Arbitration Inter Frame Spacings (AIFSs) to differentiate the access of different classes of traffic. When a node has a pending packet it must first wait for the channel to become idle for a given number A of mini-slots σ before starting to decrement its back-off; this interval of A mini-slots σ is called the AIFS. If the channel becomes busy before this back-off expires, then the node will have to to wait for another A mini-slots before starting to decrement its back-off again. The nodes can also use different back-off windows to further differentiate between different classes of traffic. The model we propose is much simpler than previous models [1], [2], [3] and handles the more general case of a Poisson arrival for the traffic. Moreover, the model presented here is designed for broadcast traffic whereas most models handle point-to-point IEEE 802.11 transmission. When we have two classes of traffic, the model leads to two coupled non-linear equations involving the transmission rates in each class of traffics. These equations can be easily solved using simple numerical methods. The model then allows the successful rate or the throughput for each class of traffic to be computed in a straightforward manner. Numerical examples derived from VANET scenarios show the direct and positive influence of the Arbitration Inter Frame Spacings on the performance of each class of traffic.
本文提出了IEEE 802.11增强型分布式协调函数(EDCF)模型,该模型可以为不同类型的流量构建不同的访问优先级。这些优先级是通过不同的帧间间隔获得的,称为仲裁帧间间隔(aifs),以区分不同类别的流量的访问。当一个节点有一个待处理的数据包时,它必须首先等待信道在给定数量a的迷你槽位σ内空闲,然后才开始递减它的回退;这个由A个迷你槽位组成的区间σ称为AIFS。如果通道在此退让到期之前变得繁忙,那么节点将不得不等待另一个迷你插槽,然后再开始减少其退让。节点还可以使用不同的后退窗口来进一步区分不同类别的流量。我们提出的模型比以前的模型[1],[2],[3]简单得多,并且处理了交通泊松到达的更一般情况。此外,这里提出的模型是为广播流量设计的,而大多数模型处理点对点的IEEE 802.11传输。当我们有两类流量时,该模型导致两个耦合的非线性方程,涉及每一类流量的传输速率。这些方程可以用简单的数值方法求解。然后,该模型允许以一种直接的方式计算每一类流量的成功率或吞吐量。从VANET场景中得到的数值例子表明,仲裁帧间间隔对每一类流量的性能有直接和积极的影响。
{"title":"Analysis of the IEEE 802.11 EDCF scheme for broadcast traffic: Application for VANETs","authors":"Younes Bouchaala, P. Mühlethaler, N. Achir","doi":"10.1109/WD.2017.7918156","DOIUrl":"https://doi.org/10.1109/WD.2017.7918156","url":null,"abstract":"In this paper we propose a model of the IEEE 802.11 Enhanced Distributed Coordination Function (EDCF) which can build different access priorities for different classes of traffic. These priorities are obtained using different inter frame spacings called Arbitration Inter Frame Spacings (AIFSs) to differentiate the access of different classes of traffic. When a node has a pending packet it must first wait for the channel to become idle for a given number A of mini-slots σ before starting to decrement its back-off; this interval of A mini-slots σ is called the AIFS. If the channel becomes busy before this back-off expires, then the node will have to to wait for another A mini-slots before starting to decrement its back-off again. The nodes can also use different back-off windows to further differentiate between different classes of traffic. The model we propose is much simpler than previous models [1], [2], [3] and handles the more general case of a Poisson arrival for the traffic. Moreover, the model presented here is designed for broadcast traffic whereas most models handle point-to-point IEEE 802.11 transmission. When we have two classes of traffic, the model leads to two coupled non-linear equations involving the transmission rates in each class of traffics. These equations can be easily solved using simple numerical methods. The model then allows the successful rate or the throughput for each class of traffic to be computed in a straightforward manner. Numerical examples derived from VANET scenarios show the direct and positive influence of the Arbitration Inter Frame Spacings on the performance of each class of traffic.","PeriodicalId":179998,"journal":{"name":"2017 Wireless Days","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125645145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
D2D discovery approach based on spreading technique for public safety 基于传播技术的公共安全D2D发现方法
Pub Date : 2017-03-01 DOI: 10.1109/WD.2017.7918149
L. Jedidi, F. Louati, M. Chekir, Hichem Besbes
Geological processes such tornados, avalanches or earthquakes can unleash adverse effects especially life losses, when we miss detect the presence of victims in devastated area. Statistics prove that death toll caused by natural hazards is becoming more prevalent from year to another. Meanwhile, telecommunications are booming with arising broadband networks. Besides, new wireless applications lead to the necessity of emerging a new communication fashion, especially in sensitive situation like public safety. Device to Device (D2D) communication, is one of promising alternative to circumvent public safety and to enhance emergency communications capabilities. The non assisted peer discovery concept over LTE raises some significant challenges so that in this paper, we propose a new approach that relies on spreading technique using orthogonal codes. Every victim signal will be spreaded by a code drawn from an orthogonal matrix called Hadamard matrix. Doing so, we improve the probability of successful detection of victims while keeping very low the probability of False Alarm thanks to the strengthening of signal by the spread process. The reliability of our proposal scheme is underlying by numerical simulations. Detection decision considers a correlation coefficient between the amount of received signal and the expected one spreaded to every orthogonal code. The coefficient is compared to a threshold in order to conclude a peer presence.
地质过程,如龙卷风、雪崩或地震,可以释放不利影响,特别是生命损失,当我们没有发现受灾地区受害者的存在。统计数据证明,自然灾害造成的死亡人数逐年增加。与此同时,随着宽带网络的兴起,电信业正在蓬勃发展。此外,新的无线应用导致出现一种新的通信方式的必要性,特别是在公共安全等敏感情况下。设备对设备(D2D)通信是规避公共安全、增强应急通信能力的一种有希望的替代方案。基于LTE的非辅助对等发现概念提出了一些重大挑战,因此本文提出了一种基于正交码的传播技术的新方法。每个受害者的信号都会通过一个代码传播从一个叫做阿达玛矩阵的正交矩阵中提取。这样,由于传播过程对信号的增强,我们提高了受害者成功检测的概率,同时保持了很低的虚警概率。数值模拟证明了该方案的可靠性。检测决策考虑接收到的信号量与期望信号量之间的相关系数。该系数与阈值进行比较,以得出同伴存在的结论。
{"title":"D2D discovery approach based on spreading technique for public safety","authors":"L. Jedidi, F. Louati, M. Chekir, Hichem Besbes","doi":"10.1109/WD.2017.7918149","DOIUrl":"https://doi.org/10.1109/WD.2017.7918149","url":null,"abstract":"Geological processes such tornados, avalanches or earthquakes can unleash adverse effects especially life losses, when we miss detect the presence of victims in devastated area. Statistics prove that death toll caused by natural hazards is becoming more prevalent from year to another. Meanwhile, telecommunications are booming with arising broadband networks. Besides, new wireless applications lead to the necessity of emerging a new communication fashion, especially in sensitive situation like public safety. Device to Device (D2D) communication, is one of promising alternative to circumvent public safety and to enhance emergency communications capabilities. The non assisted peer discovery concept over LTE raises some significant challenges so that in this paper, we propose a new approach that relies on spreading technique using orthogonal codes. Every victim signal will be spreaded by a code drawn from an orthogonal matrix called Hadamard matrix. Doing so, we improve the probability of successful detection of victims while keeping very low the probability of False Alarm thanks to the strengthening of signal by the spread process. The reliability of our proposal scheme is underlying by numerical simulations. Detection decision considers a correlation coefficient between the amount of received signal and the expected one spreaded to every orthogonal code. The coefficient is compared to a threshold in order to conclude a peer presence.","PeriodicalId":179998,"journal":{"name":"2017 Wireless Days","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129893758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Opportunistic service composition in pervasive networks 普适网络中的机会服务组合
Pub Date : 2017-03-01 DOI: 10.1109/WD.2017.7918150
Fadhlallah Baklouti, N. L. Sommer, Y. Mahéo
Composing pervasive services can be a challenging task, especially in networks where connectivity disruptions are prevalent and unpredictable, such as in networks formed spontaneously by connected things. In this paper, we propose a REST service composing system for such networks. This system has been built upon an opportunistic computing middleware to support connectivity disruptions. It implements orchestration-based and choreography-based composition techniques, and uses inter-contact time average as a metric to carry out the composition process.
组合普及服务可能是一项具有挑战性的任务,特别是在连接中断普遍且不可预测的网络中,例如在由连接的事物自发形成的网络中。本文提出了一种面向此类网络的REST服务组合系统。该系统建立在一个机会计算中间件之上,以支持连接中断。它实现了基于编排和基于编排的作曲技术,并使用相互接触的平均时间作为度量来执行作曲过程。
{"title":"Opportunistic service composition in pervasive networks","authors":"Fadhlallah Baklouti, N. L. Sommer, Y. Mahéo","doi":"10.1109/WD.2017.7918150","DOIUrl":"https://doi.org/10.1109/WD.2017.7918150","url":null,"abstract":"Composing pervasive services can be a challenging task, especially in networks where connectivity disruptions are prevalent and unpredictable, such as in networks formed spontaneously by connected things. In this paper, we propose a REST service composing system for such networks. This system has been built upon an opportunistic computing middleware to support connectivity disruptions. It implements orchestration-based and choreography-based composition techniques, and uses inter-contact time average as a metric to carry out the composition process.","PeriodicalId":179998,"journal":{"name":"2017 Wireless Days","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129295093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cyclostationary-based cooperative compressed wideband spectrum sensing in cognitive radio networks 认知无线电网络中基于循环平稳的协同压缩宽带频谱感知
Pub Date : 2017-03-01 DOI: 10.1109/WD.2017.7918119
Osama Elnahas, M. Elsabrouty
In this paper, a cooperative cyclostationary compressed spectrum sensing algorithm is proposed to enable accurate, reliable and fast sensing of wideband spectrum. In the proposed algorithm each secondary-user (SU) sends the compressed data vector to the fusion center (FC) which has a copy of the sensing matrices for all cooperated SUs. Then, at the FC, the fast fourier transform accumulation method (FAM) based on cooperative multitask compressive sensing (MCS) algorithm is employed to recover the spectral correlation function (SCF) from the compressed measurements. The proposed algorithm has two main components. The first component exploits the cooperation between SUs to produce an estimate of the investigated signal spectrum using multi-task compressive sensing. In the second component, the cyclic feature detection is performed based on the recovered SCF function. Simulation results demonstrate the robustness and the effectiveness of the proposed framework against both sampling rate reduction and noise uncertainty.
为了实现宽带频谱的准确、可靠、快速感知,提出了一种协同循环平稳压缩频谱感知算法。在该算法中,每个辅助用户(SU)将压缩后的数据向量发送到融合中心(FC),该中心拥有所有协作用户的感知矩阵副本。然后,在FC处,采用基于协同多任务压缩感知(MCS)算法的快速傅立叶变换积累法(FAM)从压缩测量中恢复光谱相关函数(SCF)。该算法主要由两个部分组成。第一个组件利用单元之间的合作,使用多任务压缩感知产生所研究信号频谱的估计。在第二组件中,基于恢复的SCF函数执行循环特征检测。仿真结果证明了该框架对采样率降低和噪声不确定性的鲁棒性和有效性。
{"title":"Cyclostationary-based cooperative compressed wideband spectrum sensing in cognitive radio networks","authors":"Osama Elnahas, M. Elsabrouty","doi":"10.1109/WD.2017.7918119","DOIUrl":"https://doi.org/10.1109/WD.2017.7918119","url":null,"abstract":"In this paper, a cooperative cyclostationary compressed spectrum sensing algorithm is proposed to enable accurate, reliable and fast sensing of wideband spectrum. In the proposed algorithm each secondary-user (SU) sends the compressed data vector to the fusion center (FC) which has a copy of the sensing matrices for all cooperated SUs. Then, at the FC, the fast fourier transform accumulation method (FAM) based on cooperative multitask compressive sensing (MCS) algorithm is employed to recover the spectral correlation function (SCF) from the compressed measurements. The proposed algorithm has two main components. The first component exploits the cooperation between SUs to produce an estimate of the investigated signal spectrum using multi-task compressive sensing. In the second component, the cyclic feature detection is performed based on the recovered SCF function. Simulation results demonstrate the robustness and the effectiveness of the proposed framework against both sampling rate reduction and noise uncertainty.","PeriodicalId":179998,"journal":{"name":"2017 Wireless Days","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130157761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
TEEM: Trust-based Energy-Efficient Distributed Monitoring for Mobile Ad-hoc Networks 基于信任的移动Ad-hoc网络节能分布式监控
Pub Date : 2017-03-01 DOI: 10.1109/WD.2017.7918128
Andrea Lupia, Kerrache Chaker Abdelaziz, F. Rango, C. Calafate, Juan-Carlos Cano, P. Manzoni
Detecting malicious and selfish nodes in mobile and wireless networks is a task that typically relies on watchdog techniques. However, such medium overhearing techniques are prone to cause a high energy consumption. In this paper we propose a distributed time division-based monitoring strategy to achieve the high security levels required while consuming less energy. Our proposal involves both trust and link duration among honest peers to fairly divide the monitoring period, and takes advantage of the periodically exchanged hello messages to make this solution fully distributed. Simulations results evidence our proposal energy efficiency, especially for high density scenarios (>100 nodes) where the consumption became stable and does not increase with the number of nodes (<4300 W·s), while ensuring high detection ratios of malicious nodes (>90%).
检测移动和无线网络中的恶意和自私节点是一项通常依赖于看门狗技术的任务。但是,这种中等强度的监听技术容易造成高能耗。在本文中,我们提出了一种基于分布式分时的监控策略,以达到高安全级别的要求,同时消耗更少的能量。我们的方案考虑了诚实对等体之间的信任和链路持续时间,以公平地划分监控周期,并利用周期性交换hello消息的优势使该方案完全分布式。模拟结果证明了我们的建议的能源效率,特别是对于高密度场景(>100个节点),其中消耗变得稳定并且不随节点数量增加(90%)。
{"title":"TEEM: Trust-based Energy-Efficient Distributed Monitoring for Mobile Ad-hoc Networks","authors":"Andrea Lupia, Kerrache Chaker Abdelaziz, F. Rango, C. Calafate, Juan-Carlos Cano, P. Manzoni","doi":"10.1109/WD.2017.7918128","DOIUrl":"https://doi.org/10.1109/WD.2017.7918128","url":null,"abstract":"Detecting malicious and selfish nodes in mobile and wireless networks is a task that typically relies on watchdog techniques. However, such medium overhearing techniques are prone to cause a high energy consumption. In this paper we propose a distributed time division-based monitoring strategy to achieve the high security levels required while consuming less energy. Our proposal involves both trust and link duration among honest peers to fairly divide the monitoring period, and takes advantage of the periodically exchanged hello messages to make this solution fully distributed. Simulations results evidence our proposal energy efficiency, especially for high density scenarios (>100 nodes) where the consumption became stable and does not increase with the number of nodes (<4300 W·s), while ensuring high detection ratios of malicious nodes (>90%).","PeriodicalId":179998,"journal":{"name":"2017 Wireless Days","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134532665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Spectrum Sharing Auction platform for Short-term licensed shared access 短期授权共享接入频谱共享拍卖平台
Pub Date : 2017-03-01 DOI: 10.1109/WD.2017.7918140
Shun-Cheng Zhan, Shi-Chung Chang, Chun-Ting Chou, Z. Tsai
Licensed shared access (LSA) is an emergent regulatory approach that allows spectrum licensed for shared secondary use among multiple entities while maintaining a level of quality of service. There have been bands planned and pilot trials conducted for LSA such as 2.3–2.4 GHz in European Union. Market mechanism and platform to realize LSA among regulator, primary license holders and secondary LSA licensees remain outstanding challenges. This paper designs and implements a prototype of online Auction platform for LSA-based Short-term Spectrum Sharing (ALS3) by exploiting two economically-robust and computation time efficient single-round auction mechanisms, one unilateral and one bilateral, that Zhan et al. proposed. Core to system implementation of ALS3 is a solution stack of Windows-Apache-MySQL-PHP (WAMP), which runs auction algorithms in the background, facilitates market player communications and brokerage database management, and provides user friendly interfaces. Performance tests over scenarios of realistic dimensions show that ALS3 completes one single-round auction within a few minutes after bid submissions. This prototype platform not only has the potential for applications to future LSA markets but may also serve as baseline environment for LSA trading behavior experiments.
许可共享访问(LSA)是一种新兴的监管方法,它允许在保持一定服务质量的同时,为多个实体之间的共享二次使用许可频谱。欧盟已经为LSA规划了2.3-2.4 GHz频段并进行了试点试验。在监管机构、主牌照持有者和二级牌照持有者之间实现LSA的市场机制和平台仍然是突出的挑战。本文利用Zhan等人提出的单边和双边两种经济稳健且计算时间高效的单轮拍卖机制,设计并实现了基于lsa的短期频谱共享(ALS3)在线拍卖平台原型。ALS3系统实现的核心是一个Windows-Apache-MySQL-PHP (WAMP)的解决方案栈,它在后台运行拍卖算法,方便市场参与者通信和经纪数据库管理,并提供友好的用户界面。对实际尺寸场景的性能测试表明,ALS3在提交投标后几分钟内完成一轮拍卖。该原型平台不仅具有应用于未来LSA市场的潜力,还可以作为LSA交易行为实验的基线环境。
{"title":"Spectrum Sharing Auction platform for Short-term licensed shared access","authors":"Shun-Cheng Zhan, Shi-Chung Chang, Chun-Ting Chou, Z. Tsai","doi":"10.1109/WD.2017.7918140","DOIUrl":"https://doi.org/10.1109/WD.2017.7918140","url":null,"abstract":"Licensed shared access (LSA) is an emergent regulatory approach that allows spectrum licensed for shared secondary use among multiple entities while maintaining a level of quality of service. There have been bands planned and pilot trials conducted for LSA such as 2.3–2.4 GHz in European Union. Market mechanism and platform to realize LSA among regulator, primary license holders and secondary LSA licensees remain outstanding challenges. This paper designs and implements a prototype of online Auction platform for LSA-based Short-term Spectrum Sharing (ALS3) by exploiting two economically-robust and computation time efficient single-round auction mechanisms, one unilateral and one bilateral, that Zhan et al. proposed. Core to system implementation of ALS3 is a solution stack of Windows-Apache-MySQL-PHP (WAMP), which runs auction algorithms in the background, facilitates market player communications and brokerage database management, and provides user friendly interfaces. Performance tests over scenarios of realistic dimensions show that ALS3 completes one single-round auction within a few minutes after bid submissions. This prototype platform not only has the potential for applications to future LSA markets but may also serve as baseline environment for LSA trading behavior experiments.","PeriodicalId":179998,"journal":{"name":"2017 Wireless Days","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127897699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2017 Wireless Days
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1