The ability to accurately predict radio propagation behavior for wireless communication systems, such as cellular mobile radio, is becoming crucial to system design. Since site measurements are costly, propagation models have been developed as suitable, low-cost, and convenient alternative. In this paper, we will propose a new generic signal propagation model for Wi-Fi and WiMAX environments. To develop this model we used existing models which are classified as: Free space models and land propagation models. This includes different types of loss: path loss, slow fading (shadowing) and fast fading. Our aim is to have a flexible model to be applicable in indoor and outdoor environments. Experiments carried out for indoor Wi-Fi and outdoor WiMAX cases have shown excellent results for the proposed model.
{"title":"A new generic model for signal propagation in Wi-Fi and WiMAX environments","authors":"R. Ezzine, Ala Al-Fuqaha, R. Braham, A. Belghith","doi":"10.1109/WD.2008.4812872","DOIUrl":"https://doi.org/10.1109/WD.2008.4812872","url":null,"abstract":"The ability to accurately predict radio propagation behavior for wireless communication systems, such as cellular mobile radio, is becoming crucial to system design. Since site measurements are costly, propagation models have been developed as suitable, low-cost, and convenient alternative. In this paper, we will propose a new generic signal propagation model for Wi-Fi and WiMAX environments. To develop this model we used existing models which are classified as: Free space models and land propagation models. This includes different types of loss: path loss, slow fading (shadowing) and fast fading. Our aim is to have a flexible model to be applicable in indoor and outdoor environments. Experiments carried out for indoor Wi-Fi and outdoor WiMAX cases have shown excellent results for the proposed model.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130494584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we are going to study and analyze the security management process for video surveillance systems. Subsequently, an architecture concept will be presented, showing the different standard security processes e.g. physical security, application security, network security and describe and analyze the individual factors affecting each process. Then the influence and impact to the video surveillance business continuity as well as on the law & ethic issues will be discussed. Finally the interdependencies between different security process and/or the different security parameters in video surveillance systems will be analyzed while keeping in mind the heterogeneous nature of the networks in order to achieve an optimal security management process architecture.
{"title":"Security management process or video surveillance systems in heterogeneous communication networks","authors":"K. Kraus, O. Martikainen, R. Reda","doi":"10.1109/WD.2008.4812865","DOIUrl":"https://doi.org/10.1109/WD.2008.4812865","url":null,"abstract":"In this paper, we are going to study and analyze the security management process for video surveillance systems. Subsequently, an architecture concept will be presented, showing the different standard security processes e.g. physical security, application security, network security and describe and analyze the individual factors affecting each process. Then the influence and impact to the video surveillance business continuity as well as on the law & ethic issues will be discussed. Finally the interdependencies between different security process and/or the different security parameters in video surveillance systems will be analyzed while keeping in mind the heterogeneous nature of the networks in order to achieve an optimal security management process architecture.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134396449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
One of the main issues in the fourth generation (4G) wireless networks is the vertical handoff decision. The handoff is the mechanism used in order to let a mobile node (MN) switches from a network to another without remarkable service disconnection. Thus, the delay consumed to choose the suitable network to which the MN may connect is a major issue, which may impact the offered quality of service (QoS). In this paper we will present a Secured Vertical Handoff Decision (Sec-DVHD) scheme using the PKI algorithm, which is an extension of our proposed scheme, the distributed vertical handoff decision (DVHD). The simulation shows a good performance of the Sec-DVHD in term of handoff blocking rate and throughput.
{"title":"Secured vertical handoff decision scheme for the Fourth Generation (4G) wireless networks","authors":"R. Tawil, Jacques Demarjien, G. Pujolle","doi":"10.1109/WD.2008.4812889","DOIUrl":"https://doi.org/10.1109/WD.2008.4812889","url":null,"abstract":"One of the main issues in the fourth generation (4G) wireless networks is the vertical handoff decision. The handoff is the mechanism used in order to let a mobile node (MN) switches from a network to another without remarkable service disconnection. Thus, the delay consumed to choose the suitable network to which the MN may connect is a major issue, which may impact the offered quality of service (QoS). In this paper we will present a Secured Vertical Handoff Decision (Sec-DVHD) scheme using the PKI algorithm, which is an extension of our proposed scheme, the distributed vertical handoff decision (DVHD). The simulation shows a good performance of the Sec-DVHD in term of handoff blocking rate and throughput.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130087530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We consider the sum rate maximization problem in downlink OFDMA systems subject to total transmit power and minimum user rate constraints. A low complexity suboptimal resource allocation algorithm is proposed for joint optimization of multiuser subcarrier assignment and power allocation. The algorithm is based on Lagrangian relaxation where the non-convex optimization problem is decomposed into a master problem and a subproblem. Subproblem has a similar form as standard weighted sum rate maximization subject to total transmit power. Standard subgradient method is used in the master problem and a suboptimal algorithm inspired from primal decomposition techniques is also proposed to approximately solve the subproblem. Simulations are provided to compare the performance of the proposed algorithm to fixed spectrum assignment based algorithms with adaptive power control.
{"title":"Adaptive subcarrier and power allocation for OFDMA systems","authors":"C. Weeraddana, W. Li, M. Codreanu, M. Latva-aho","doi":"10.1109/WD.2008.4812830","DOIUrl":"https://doi.org/10.1109/WD.2008.4812830","url":null,"abstract":"We consider the sum rate maximization problem in downlink OFDMA systems subject to total transmit power and minimum user rate constraints. A low complexity suboptimal resource allocation algorithm is proposed for joint optimization of multiuser subcarrier assignment and power allocation. The algorithm is based on Lagrangian relaxation where the non-convex optimization problem is decomposed into a master problem and a subproblem. Subproblem has a similar form as standard weighted sum rate maximization subject to total transmit power. Standard subgradient method is used in the master problem and a suboptimal algorithm inspired from primal decomposition techniques is also proposed to approximately solve the subproblem. Simulations are provided to compare the performance of the proposed algorithm to fixed spectrum assignment based algorithms with adaptive power control.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117260151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents analytical results that formalize fair-and-effective partnership selection for a distributed wireless network where user cooperation is employed to enhance the network performance and each individual user has the responsibility of identifying an appropriate partner, or makes a decision if a partnership opportunity is offered by other users. In particular, a 2-user time-division reciprocal cooperation is used so that the transmitters in a network are arranged into pairs of cooperating users with the aid of the channel state information (CSI) at the user nodes.
{"title":"Wireless cooperative networks: Partnership selection and fairness","authors":"E. Elsheikh, Kai‐Kit Wong","doi":"10.1109/WD.2008.4812891","DOIUrl":"https://doi.org/10.1109/WD.2008.4812891","url":null,"abstract":"This paper presents analytical results that formalize fair-and-effective partnership selection for a distributed wireless network where user cooperation is employed to enhance the network performance and each individual user has the responsibility of identifying an appropriate partner, or makes a decision if a partnership opportunity is offered by other users. In particular, a 2-user time-division reciprocal cooperation is used so that the transmitters in a network are arranged into pairs of cooperating users with the aid of the channel state information (CSI) at the user nodes.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126475223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. A. Khan, C. Truong, T. Geithner, F. Sivrikaya, S. Albayrak
The increasing number of radio access technologies and the availability of multi-radio devices boost the need for novel resource allocation schemes in cellular networks. This paper uses a cooperative game theoretic approach for resource allocation at the network level, while utilizing simultaneous use of available radio interfaces at the device level. We model resource allocation management using the well known bankruptcy model and apply Kalai-Smorodinsky bargaining solution method to find a distribution rule, based on which we propose resource allocation and call admission control schemes. Performance analysis of our allocation and control schemes demonstrates significant improvements over previous approaches in terms of utilization of the available bandwidth and the number of call drops.
{"title":"Network level cooperation for resource allocation in future wireless networks","authors":"M. A. Khan, C. Truong, T. Geithner, F. Sivrikaya, S. Albayrak","doi":"10.1109/WD.2008.4812916","DOIUrl":"https://doi.org/10.1109/WD.2008.4812916","url":null,"abstract":"The increasing number of radio access technologies and the availability of multi-radio devices boost the need for novel resource allocation schemes in cellular networks. This paper uses a cooperative game theoretic approach for resource allocation at the network level, while utilizing simultaneous use of available radio interfaces at the device level. We model resource allocation management using the well known bankruptcy model and apply Kalai-Smorodinsky bargaining solution method to find a distribution rule, based on which we propose resource allocation and call admission control schemes. Performance analysis of our allocation and control schemes demonstrates significant improvements over previous approaches in terms of utilization of the available bandwidth and the number of call drops.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134136633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we present an architecture and associated protocol extensions for securing the media stream of a VoIP session. We make use of ZRTP which is a key agreement protocol that allows two parties to agree upon a secret session key over the media path. Because ZRTP is based on the popular Diffie-Hellmann key exchange mechanism it is inherently vulnerable to man-in-the-middle (MITM) attacks. Although ZRTP offers a mechanism for the prevention of MITM attacks, a sophisticated attacker might be able to launch a successful attack in certain scenarios. We describe an approach that provides authentic cryptographic parameters for ZRTP without sacrificing the independence from a user-level Public Key Infrastructure (PKI). We propose to use the mechanisms provided by RFC 4474 (SIP Identity) to ensure the identity of the parties involved in an ZRTP key exchange.
{"title":"Using SIP identity to prevent man-in-the-middle attacks on ZRTP","authors":"O. Jung, M. Petraschek, T. Hoeher, I. Gojmerac","doi":"10.1109/WD.2008.4812920","DOIUrl":"https://doi.org/10.1109/WD.2008.4812920","url":null,"abstract":"In this paper we present an architecture and associated protocol extensions for securing the media stream of a VoIP session. We make use of ZRTP which is a key agreement protocol that allows two parties to agree upon a secret session key over the media path. Because ZRTP is based on the popular Diffie-Hellmann key exchange mechanism it is inherently vulnerable to man-in-the-middle (MITM) attacks. Although ZRTP offers a mechanism for the prevention of MITM attacks, a sophisticated attacker might be able to launch a successful attack in certain scenarios. We describe an approach that provides authentic cryptographic parameters for ZRTP without sacrificing the independence from a user-level Public Key Infrastructure (PKI). We propose to use the mechanisms provided by RFC 4474 (SIP Identity) to ensure the identity of the parties involved in an ZRTP key exchange.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133158259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Abid, Mathieu Ligocki, Lionel Molinier, Gérard Nguenguang, G. Pujolle, D. Gaïti, H. Zimmermann
With the multiplication of wireless communication networks and the increasing capabilities of the user devices equipped with multiple technology interfaces, being always connected tends to be a reality in the near future. In this article we propose to pilot the current weak handover algorithms using an autonomic agent-based piloting system. We specifically focus on the pre-execution handover process. The proposed system main contributions are to recover the useful information and compute it to obtain useful knowledge. This latter will be used for feeding a sophisticated handover decision algorithm in order to pick the most appropriate access network. We have developed a real testbed to evaluate and validate our solution unlike most proposed works analyzed only by simulations and thus avoid practical problems encountered in real environment. Above this real platform we performed an experimentation in 802.11 wireless networks that shows promising results.
{"title":"Practical handover optimization solution using autonomic agent-based piloting system","authors":"M. Abid, Mathieu Ligocki, Lionel Molinier, Gérard Nguenguang, G. Pujolle, D. Gaïti, H. Zimmermann","doi":"10.1109/WD.2008.4812921","DOIUrl":"https://doi.org/10.1109/WD.2008.4812921","url":null,"abstract":"With the multiplication of wireless communication networks and the increasing capabilities of the user devices equipped with multiple technology interfaces, being always connected tends to be a reality in the near future. In this article we propose to pilot the current weak handover algorithms using an autonomic agent-based piloting system. We specifically focus on the pre-execution handover process. The proposed system main contributions are to recover the useful information and compute it to obtain useful knowledge. This latter will be used for feeding a sophisticated handover decision algorithm in order to pick the most appropriate access network. We have developed a real testbed to evaluate and validate our solution unlike most proposed works analyzed only by simulations and thus avoid practical problems encountered in real environment. Above this real platform we performed an experimentation in 802.11 wireless networks that shows promising results.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131218191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The aim of this paper is to validate a synthetic trace generator by means of a local campus experiment based on opportunistic networking. We employed pocket trace recorder (PTR) devices in order to explore human mobility and to make real connectivity available for reproducing its statistical features by artificial model simulations.
{"title":"Experimental validation of a 2-level social mobility model in opportunistic networks","authors":"S. Gaito, G. Grossi, F. Pedersini, G. P. Rossi","doi":"10.1109/WD.2008.4812850","DOIUrl":"https://doi.org/10.1109/WD.2008.4812850","url":null,"abstract":"The aim of this paper is to validate a synthetic trace generator by means of a local campus experiment based on opportunistic networking. We employed pocket trace recorder (PTR) devices in order to explore human mobility and to make real connectivity available for reproducing its statistical features by artificial model simulations.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123359788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}