首页 > 最新文献

2017 IEEE 17th International Conference on Communication Technology (ICCT)最新文献

英文 中文
A secure positioning algorithm against Sybil attack in wireless sensor networks based on number allocating 一种基于分号的无线传感器网络抗Sybil攻击安全定位算法
Pub Date : 2017-10-01 DOI: 10.1109/ICCT.2017.8359771
Q. Tang, Jian Wang
In the process of locating in wireless sensor networks, the illegal nodes through Sybil attack can act as anchor nodes by capturing or constructing fake nodes, and further send the wrong location reference information. Considering the nodes through Sybil attack must first pass the neighbor's discovery and identification processes, we propose a secure positioning algorithm based on number allocating and mutual guarantee relying on neighbors. If the declaration number, the guaranteed node and its own ID of a node aren't completely matching, then the neighbors refuse the node to enter the network. The scheme also adopts the authentication mechanism of one-way hash function. There's no need for base station or cluster heads, so we achieve fast, lightweight and high detection rate secure localization. Compared with similar literature, this secure algorithm has a higher detection rate and positioning accuracy, and the communication cost is smaller.
在无线传感器网络的定位过程中,通过Sybil攻击的非法节点可以通过捕获或构造假节点作为锚节点,进而发送错误的位置参考信息。考虑到遭受Sybil攻击的节点必须首先通过邻居的发现和识别过程,我们提出了一种基于数量分配和依赖邻居相互保证的安全定位算法。如果一个节点的声明号、被保证的节点和它自己的ID不完全匹配,那么邻居会拒绝该节点进入网络。该方案还采用了单向哈希函数的认证机制。不需要基站或簇头,因此我们实现了快速,轻量级和高检测率的安全定位。与同类文献相比,该安全算法具有更高的检测率和定位精度,且通信成本更小。
{"title":"A secure positioning algorithm against Sybil attack in wireless sensor networks based on number allocating","authors":"Q. Tang, Jian Wang","doi":"10.1109/ICCT.2017.8359771","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359771","url":null,"abstract":"In the process of locating in wireless sensor networks, the illegal nodes through Sybil attack can act as anchor nodes by capturing or constructing fake nodes, and further send the wrong location reference information. Considering the nodes through Sybil attack must first pass the neighbor's discovery and identification processes, we propose a secure positioning algorithm based on number allocating and mutual guarantee relying on neighbors. If the declaration number, the guaranteed node and its own ID of a node aren't completely matching, then the neighbors refuse the node to enter the network. The scheme also adopts the authentication mechanism of one-way hash function. There's no need for base station or cluster heads, so we achieve fast, lightweight and high detection rate secure localization. Compared with similar literature, this secure algorithm has a higher detection rate and positioning accuracy, and the communication cost is smaller.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130989303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Topology inference for CSMA/CA wireless network based on inter frame space 基于帧间空间的CSMA/CA无线网络拓扑推理
Pub Date : 2017-10-01 DOI: 10.1109/ICCT.2017.8359681
Shengxiang Li, Guangyi Liu, Ou Li, Siyuan Ding
In this paper, we propose a novel approach called Wntiifs to infer the topology of CSMA/CA wireless network without the need to cooperate in the network or decode the network's messages. The approach divides RF frames observed into session atoms according to an inter frame space threshold, and ensures that a session atom consists only of frames transmitted by two nodes. Then, it extracts the link in each atom in different observation time window. Finally, it merges the links in different time window to reconstruct the complete network topology. Experimental results demonstrate that, compared with the existing wireless network topology inference algorithms, Wntiifs is of higher topology inference accuracy.
在本文中,我们提出了一种称为Wntiifs的新方法来推断CSMA/CA无线网络的拓扑结构,而无需在网络中合作或解码网络的消息。该方法根据帧间空间阈值将观察到的RF帧划分为会话原子,并确保会话原子仅由两个节点传输的帧组成。然后,在不同的观测时间窗提取每个原子中的链接。最后,对不同时间窗口的链路进行合并,重构出完整的网络拓扑结构。实验结果表明,与现有的无线网络拓扑推理算法相比,Wntiifs具有更高的拓扑推理精度。
{"title":"Topology inference for CSMA/CA wireless network based on inter frame space","authors":"Shengxiang Li, Guangyi Liu, Ou Li, Siyuan Ding","doi":"10.1109/ICCT.2017.8359681","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359681","url":null,"abstract":"In this paper, we propose a novel approach called Wntiifs to infer the topology of CSMA/CA wireless network without the need to cooperate in the network or decode the network's messages. The approach divides RF frames observed into session atoms according to an inter frame space threshold, and ensures that a session atom consists only of frames transmitted by two nodes. Then, it extracts the link in each atom in different observation time window. Finally, it merges the links in different time window to reconstruct the complete network topology. Experimental results demonstrate that, compared with the existing wireless network topology inference algorithms, Wntiifs is of higher topology inference accuracy.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130396463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Construction of compressed sensing matrix based on complementary sequence 基于互补序列的压缩感知矩阵构造
Pub Date : 2017-10-01 DOI: 10.1109/ICCT.2017.8359477
Shufeng Li, Hongda Wu, Libiao Jin, Shanshan Wei
We propose a new construction method for deterministic sensing matrix, using complementary sequence, which is called Compressed Sensing Matrix Based on Cyclic Complementary Sequence. Simulation results show that the reconstruction of this matrix better than sparse sensing matrices and Toeplitz matrices. Once the complementary sequences are given, each element in the matrix can be determined, and thus the uncertainty caused by using random matrices shall be avoided; moreover, the cyclic property of the matrix proposed makes it easier for hardware implementation and avoid the deficiency of taking up large storage space, which is universal for random matrices, and thus makes the matrix more practical.
提出了一种利用互补序列构造确定性感知矩阵的新方法,即基于循环互补序列的压缩感知矩阵。仿真结果表明,该矩阵的重构效果优于稀疏感知矩阵和Toeplitz矩阵。一旦给出互补序列,就可以确定矩阵中的每个元素,从而避免了使用随机矩阵带来的不确定性;此外,所提出的矩阵的循环性质使其更易于硬件实现,避免了占用存储空间大的缺点,这是随机矩阵的通用性,从而使矩阵更具实用性。
{"title":"Construction of compressed sensing matrix based on complementary sequence","authors":"Shufeng Li, Hongda Wu, Libiao Jin, Shanshan Wei","doi":"10.1109/ICCT.2017.8359477","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359477","url":null,"abstract":"We propose a new construction method for deterministic sensing matrix, using complementary sequence, which is called Compressed Sensing Matrix Based on Cyclic Complementary Sequence. Simulation results show that the reconstruction of this matrix better than sparse sensing matrices and Toeplitz matrices. Once the complementary sequences are given, each element in the matrix can be determined, and thus the uncertainty caused by using random matrices shall be avoided; moreover, the cyclic property of the matrix proposed makes it easier for hardware implementation and avoid the deficiency of taking up large storage space, which is universal for random matrices, and thus makes the matrix more practical.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127841233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Random forest algorithm under differential privacy 差分隐私下的随机森林算法
Pub Date : 2017-10-01 DOI: 10.1109/ICCT.2017.8359960
Zekun Li, Shuyu Li
Trying to solve the risk of data privacy disclosure in classification process, a Random Forest algorithm under differential privacy named DPRF-gini is proposed in the paper. In the process of building decision tree, the algorithm first disturbed the process of feature selection and attribute partition by using exponential mechanism, and then meet the requirement of differential privacy by adding Laplace noise to the leaf node. Compared with the original algorithm, Empirical results show that protection of data privacy is further enhanced while the accuracy of the algorithm is slightly reduced.
为了解决分类过程中数据隐私泄露的风险,本文提出了一种差分隐私下的随机森林算法DPRF-gini。在构建决策树的过程中,该算法首先利用指数机制干扰特征选择和属性划分过程,然后通过在叶节点上加入拉普拉斯噪声来满足差分隐私的要求。实证结果表明,与原算法相比,该算法对数据隐私的保护进一步增强,但算法的准确性略有降低。
{"title":"Random forest algorithm under differential privacy","authors":"Zekun Li, Shuyu Li","doi":"10.1109/ICCT.2017.8359960","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359960","url":null,"abstract":"Trying to solve the risk of data privacy disclosure in classification process, a Random Forest algorithm under differential privacy named DPRF-gini is proposed in the paper. In the process of building decision tree, the algorithm first disturbed the process of feature selection and attribute partition by using exponential mechanism, and then meet the requirement of differential privacy by adding Laplace noise to the leaf node. Compared with the original algorithm, Empirical results show that protection of data privacy is further enhanced while the accuracy of the algorithm is slightly reduced.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131653639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Hybrid indoor localization method based on signal subspace fingerprint database 基于信号子空间指纹库的混合室内定位方法
Pub Date : 2017-10-01 DOI: 10.1109/ICCT.2017.8359811
Weigang Wang, Wenrui Wang, Kexue Sun
To solve the localization problem of multipath propagation in complex indoor circumstance, a localization method of signal subspace matching based on fingerprint database is proposed by using small antenna array in the indoor environment. Compared to the RSSI, the signal subspace fingerprint can obtain better effect by utilizing more space information. The received signal from each array is firstly processed with self-correlation and it's eigenvalue decomposed to create the signal subspace fingerprint. Location is then determined by the smallest angle between the received signal subspace and the fingerprint database. Simulation results show that the proposed algorithm has made a great improvement in localization accuracy.
为解决复杂室内环境下多径传播的定位问题,提出了一种基于指纹库的信号子空间匹配定位方法。相对于RSSI,信号子空间指纹可以利用更多的空间信息获得更好的效果。首先对每个阵列接收到的信号进行自相关处理,并对其特征值进行分解,形成信号子空间指纹。然后通过接收信号子空间与指纹数据库之间的最小角度确定位置。仿真结果表明,该算法在定位精度上有较大的提高。
{"title":"Hybrid indoor localization method based on signal subspace fingerprint database","authors":"Weigang Wang, Wenrui Wang, Kexue Sun","doi":"10.1109/ICCT.2017.8359811","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359811","url":null,"abstract":"To solve the localization problem of multipath propagation in complex indoor circumstance, a localization method of signal subspace matching based on fingerprint database is proposed by using small antenna array in the indoor environment. Compared to the RSSI, the signal subspace fingerprint can obtain better effect by utilizing more space information. The received signal from each array is firstly processed with self-correlation and it's eigenvalue decomposed to create the signal subspace fingerprint. Location is then determined by the smallest angle between the received signal subspace and the fingerprint database. Simulation results show that the proposed algorithm has made a great improvement in localization accuracy.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128821266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Salient region detection based on Adaboost and integration of multi-features space 基于Adaboost的显著区域检测与多特征空间融合
Pub Date : 2017-10-01 DOI: 10.1109/ICCT.2017.8359883
Yi Zhang, Qi-chang Duan, Sile Li, Yunxian Ran
Based on the existing methods, this paper tries to propose a salient region detection based on integrated theory of features and Adaboost algorithm. The integration theory of features indicates that the salient region corresponds to multi-features space, such as color, direction, shape, texture and so on. And the visual system deals with independent features in parallel. The visual system make individual characteristics become a salient area. Adaboost algorithm is able to integrate multiple independent weakly classifiers into a high-performance and powerful classifier. In order to obtain better salient region result, this paper introduces the Adaboost theory to integrate multi-features space.
在现有方法的基础上,本文尝试提出一种基于特征融合理论和Adaboost算法的显著区域检测方法。特征的整合理论表明,突出区域对应于多特征空间,如颜色、方向、形状、纹理等。视觉系统并行处理独立的特征。视觉系统使个体特征成为一个突出的区域。Adaboost算法能够将多个独立的弱分类器集成为一个高性能且功能强大的分类器。为了获得更好的显著区结果,本文引入Adaboost理论对多特征空间进行整合。
{"title":"Salient region detection based on Adaboost and integration of multi-features space","authors":"Yi Zhang, Qi-chang Duan, Sile Li, Yunxian Ran","doi":"10.1109/ICCT.2017.8359883","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359883","url":null,"abstract":"Based on the existing methods, this paper tries to propose a salient region detection based on integrated theory of features and Adaboost algorithm. The integration theory of features indicates that the salient region corresponds to multi-features space, such as color, direction, shape, texture and so on. And the visual system deals with independent features in parallel. The visual system make individual characteristics become a salient area. Adaboost algorithm is able to integrate multiple independent weakly classifiers into a high-performance and powerful classifier. In order to obtain better salient region result, this paper introduces the Adaboost theory to integrate multi-features space.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125424138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On minimizing average packets decoding delay based on B-DLNC for wireless broadcasting 基于B-DLNC的无线广播平均分组解码延迟最小化研究
Pub Date : 2017-10-01 DOI: 10.1109/ICCT.2017.8359750
Teng Niu, Zhi Chen, Dongmei Zhang, Kui Xu
We are concerned with designing an optimal binary determine linear network coding (B-DLNC) strategy with the aim of reducing the number of transmissions and the average packets decoding delay for wireless broadcasting scenarios. In this paper, we first propose the concept of the B-DLNC that no longer limits the encoding packets to be immediately decoded by the receivers and allows the receivers to cache the correctly received undecodable retransmission packets waiting for future decoding opportunities. Next, we use channel coding theory (generation matrix and decoding matrix) to analyze the performance of B-DLNC strategy. In addition, we formulate the average packets decoding delay minimization problem as a max-weight search problem and propose a heuristic algorithm (IMWSA) to improve search efficiency. The simulation results show that compared with the traditional strategies, the proposed strategy can obviously reduce the number of transmissions and average packets decoding delay.
为了减少无线广播场景下的传输次数和平均分组解码延迟,我们设计了一种最优的二进制确定线性网络编码(B-DLNC)策略。在本文中,我们首先提出了B-DLNC的概念,它不再限制编码数据包被接收方立即解码,并允许接收方缓存正确接收的不可解码重传数据包,等待未来的解码机会。其次,我们利用信道编码理论(生成矩阵和解码矩阵)分析了B-DLNC策略的性能。此外,我们将平均数据包解码延迟最小化问题表述为最大权值搜索问题,并提出了一种启发式算法(IMWSA)来提高搜索效率。仿真结果表明,与传统策略相比,该策略可以明显减少传输次数和平均数据包解码延迟。
{"title":"On minimizing average packets decoding delay based on B-DLNC for wireless broadcasting","authors":"Teng Niu, Zhi Chen, Dongmei Zhang, Kui Xu","doi":"10.1109/ICCT.2017.8359750","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359750","url":null,"abstract":"We are concerned with designing an optimal binary determine linear network coding (B-DLNC) strategy with the aim of reducing the number of transmissions and the average packets decoding delay for wireless broadcasting scenarios. In this paper, we first propose the concept of the B-DLNC that no longer limits the encoding packets to be immediately decoded by the receivers and allows the receivers to cache the correctly received undecodable retransmission packets waiting for future decoding opportunities. Next, we use channel coding theory (generation matrix and decoding matrix) to analyze the performance of B-DLNC strategy. In addition, we formulate the average packets decoding delay minimization problem as a max-weight search problem and propose a heuristic algorithm (IMWSA) to improve search efficiency. The simulation results show that compared with the traditional strategies, the proposed strategy can obviously reduce the number of transmissions and average packets decoding delay.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126866416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on user identification algorithm based on massive multi-site VPN log 基于海量多站点VPN日志的用户识别算法研究
Pub Date : 2017-10-01 DOI: 10.1109/ICCT.2017.8359858
Bingbing Lu, Hua Zhang, B. Liu, Zhonghua Zhao
VPN (Virtual Private Network) is the primary mean for users to access network information by crossing the border currently. There is little research about VPN users, though the number of users who using VPN is pretty large. Consequently, it is desiderated to find a solution to strengthen the ability to observe and discover cross-border access users. This paper proposes a novel user identification algorithm according to massive multi-site VPN log. First of all, a formal description of VPN user identification problems is given, then we analyze quantitatively for probability distribution of VPN log in two dimensions: usernames and CIP (Client Internet Protocol) addresses. Based on this, we give the solution of problems in VPN user identification, and propose a user identification algorithm based on the combination of access vector similarity, username similarity, the number of regions where users surf the internet and the connected subgraphs. Then we test the algorithm in VPN log within two months, which has proved the effectiveness and correctness of user identification algorithm.
VPN (Virtual Private Network)是目前用户跨界访问网络信息的主要手段。关于VPN用户的研究很少,尽管使用VPN的用户数量相当大。因此,迫切需要找到一种解决方案来加强对跨境接入用户的观察和发现能力。本文提出了一种基于海量多站点VPN日志的用户身份识别算法。首先给出了VPN用户识别问题的形式化描述,然后定量分析了VPN日志在用户名和客户端互联网协议地址两个维度上的概率分布。在此基础上,给出了VPN用户识别问题的解决方案,提出了一种基于接入向量相似度、用户名相似度、用户上网区域数和连接子图相结合的用户识别算法。并在两个月内对该算法进行了VPN日志测试,验证了该算法的有效性和正确性。
{"title":"Research on user identification algorithm based on massive multi-site VPN log","authors":"Bingbing Lu, Hua Zhang, B. Liu, Zhonghua Zhao","doi":"10.1109/ICCT.2017.8359858","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359858","url":null,"abstract":"VPN (Virtual Private Network) is the primary mean for users to access network information by crossing the border currently. There is little research about VPN users, though the number of users who using VPN is pretty large. Consequently, it is desiderated to find a solution to strengthen the ability to observe and discover cross-border access users. This paper proposes a novel user identification algorithm according to massive multi-site VPN log. First of all, a formal description of VPN user identification problems is given, then we analyze quantitatively for probability distribution of VPN log in two dimensions: usernames and CIP (Client Internet Protocol) addresses. Based on this, we give the solution of problems in VPN user identification, and propose a user identification algorithm based on the combination of access vector similarity, username similarity, the number of regions where users surf the internet and the connected subgraphs. Then we test the algorithm in VPN log within two months, which has proved the effectiveness and correctness of user identification algorithm.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126880046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research and implementation of reliable dynamic access based on cognitive radio 基于认知无线电的可靠动态接入的研究与实现
Pub Date : 2017-10-01 DOI: 10.1109/icct.2017.8359751
Shi Qian-qian, Zhang Yan, Zhao Peng
In this paper, we design a communication system in order to improve the utilization of spectral debris using the idea of cognitive radio by detecting the spectrum of external environment to provide a reference for the avoidance of communication interference. Accordingly, a communication system transmission using the method of spectrum energy sensing, based on the software-defined radio (SDR) platform of NI company's universal software radio peripheral (USRPs) and the graphical programming language LabVIEW software, achieves a reliable dynamic access for video transmission. We also design adaptive access and frequency hopping access for the data channel and control channel, thus completing the anti-jamming communication system.
本文采用认知无线电的思想,通过检测外部环境的频谱,为避免通信干扰提供参考,设计了一种提高频谱碎片利用率的通信系统。因此,基于NI公司通用软件无线电外设(usrp)的软件定义无线电(SDR)平台和图形化编程语言LabVIEW软件,采用频谱能量传感方法的通信系统传输,实现了视频传输的可靠动态接入。并对数据信道和控制信道设计了自适应接入和跳频接入,从而完成了抗干扰通信系统。
{"title":"Research and implementation of reliable dynamic access based on cognitive radio","authors":"Shi Qian-qian, Zhang Yan, Zhao Peng","doi":"10.1109/icct.2017.8359751","DOIUrl":"https://doi.org/10.1109/icct.2017.8359751","url":null,"abstract":"In this paper, we design a communication system in order to improve the utilization of spectral debris using the idea of cognitive radio by detecting the spectrum of external environment to provide a reference for the avoidance of communication interference. Accordingly, a communication system transmission using the method of spectrum energy sensing, based on the software-defined radio (SDR) platform of NI company's universal software radio peripheral (USRPs) and the graphical programming language LabVIEW software, achieves a reliable dynamic access for video transmission. We also design adaptive access and frequency hopping access for the data channel and control channel, thus completing the anti-jamming communication system.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123350077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sensitivity analysis of ring oscillator based hardware Trojan detection 基于环形振荡器的硬件木马检测灵敏度分析
Pub Date : 2017-10-01 DOI: 10.1109/ICCT.2017.8359975
Y. Qin, Tongsheng Xia
With the rapid development of Integrated Circuit (IC) technology, more and more attentions are paid to chip security issues. As Hardware Trojan horse becomes a great potential threat to the IC industry, researches have been done on Trojan detection methods. Recently, Ring Oscillator Network (RON) detection structure has been proposed to precisely detect the Hardware Trojan. And we find the detection accuracy of RON detection method is affected by Trojan circuit logic gate switching frequency. In this paper, we analyze the impact of Hardware Trojan activity on ring oscillator frequency. A Hardware Trojan is used to study the detection sensitivity of RON detection structure at different Trojan gate switching frequencies. Result shows the Hardware Trojan gate switching noise has a spatial influence on the frequency of RO array. Especially we find that too low Trojan gate switching frequency will make the RON detection unsuccessful.
随着集成电路技术的飞速发展,芯片安全问题越来越受到人们的关注。随着硬件木马对集成电路行业的潜在威胁越来越大,人们对木马检测方法进行了研究。近年来,为了精确检测硬件木马,提出了环振网络(RON)检测结构。研究发现,特洛伊电路逻辑门开关频率对RON检测方法的检测精度有一定影响。本文分析了硬件木马活动对环形振荡器频率的影响。利用硬件特洛伊木马研究了RON检测结构在不同特洛伊门开关频率下的检测灵敏度。结果表明,硬件特洛伊门开关噪声对反渗透阵列的频率有空间影响。特别是我们发现过低的特洛伊门开关频率会使RON检测不成功。
{"title":"Sensitivity analysis of ring oscillator based hardware Trojan detection","authors":"Y. Qin, Tongsheng Xia","doi":"10.1109/ICCT.2017.8359975","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359975","url":null,"abstract":"With the rapid development of Integrated Circuit (IC) technology, more and more attentions are paid to chip security issues. As Hardware Trojan horse becomes a great potential threat to the IC industry, researches have been done on Trojan detection methods. Recently, Ring Oscillator Network (RON) detection structure has been proposed to precisely detect the Hardware Trojan. And we find the detection accuracy of RON detection method is affected by Trojan circuit logic gate switching frequency. In this paper, we analyze the impact of Hardware Trojan activity on ring oscillator frequency. A Hardware Trojan is used to study the detection sensitivity of RON detection structure at different Trojan gate switching frequencies. Result shows the Hardware Trojan gate switching noise has a spatial influence on the frequency of RO array. Especially we find that too low Trojan gate switching frequency will make the RON detection unsuccessful.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123357822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2017 IEEE 17th International Conference on Communication Technology (ICCT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1