In cellular network, the deployment of the relay station can bring spatial diversity to increase link capacity and improve communication performance. In this paper, we consider an optimal power allocation scheme for the source and the relay to minimize the bit error rate(BER) at the destination under the power and outage constraint in cooperative relay system. Simulation results show that the BER performance can achieve a significant gain by the proposed power allocation scheme. With different relay strategies such as AF and DF, different transmit power are allocated for the source and the relay to achieve the required BER performance in the downlink cooperation.
{"title":"Optimal Power Allocation for Cooperative Networks","authors":"Yuewu Dong, X. Wen, Wei Zheng, Yong Sun","doi":"10.1109/ICCSN.2010.38","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.38","url":null,"abstract":"In cellular network, the deployment of the relay station can bring spatial diversity to increase link capacity and improve communication performance. In this paper, we consider an optimal power allocation scheme for the source and the relay to minimize the bit error rate(BER) at the destination under the power and outage constraint in cooperative relay system. Simulation results show that the BER performance can achieve a significant gain by the proposed power allocation scheme. With different relay strategies such as AF and DF, different transmit power are allocated for the source and the relay to achieve the required BER performance in the downlink cooperation.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115959766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Least Significant Bit (LSB) Substitution is a kind of information hiding method. The secret message is embedded into the last r bits of a cover image to get away from the notice of hackers. The security and stego-image quality are two main issues of the LSB substitution method. Therefore, some researchers propose an LSB substitution matrix to address these two issues. Finding an optimal LSB substitution matrix can be seen as a problem of combinatorial optimization. There are 2r! feasible solutions, hence the search space grows notably when r increases. Consequently, an efficient method to construct the matrix is necessary. In this paper, we apply the Ant Colony Optimization Algorithm to construct an optimal LSB substitution matrix. The experimental results show that ACO can find optimal LSB substitution matrix efficiently and improve the qualities of the stego-images.
{"title":"Finding Optimal LSB Substitution Using Ant Colony Optimization Algorithm","authors":"Ching-Sheng Hsu, Shu-Fen Tu","doi":"10.1109/ICCSN.2010.61","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.61","url":null,"abstract":"The Least Significant Bit (LSB) Substitution is a kind of information hiding method. The secret message is embedded into the last r bits of a cover image to get away from the notice of hackers. The security and stego-image quality are two main issues of the LSB substitution method. Therefore, some researchers propose an LSB substitution matrix to address these two issues. Finding an optimal LSB substitution matrix can be seen as a problem of combinatorial optimization. There are 2r! feasible solutions, hence the search space grows notably when r increases. Consequently, an efficient method to construct the matrix is necessary. In this paper, we apply the Ant Colony Optimization Algorithm to construct an optimal LSB substitution matrix. The experimental results show that ACO can find optimal LSB substitution matrix efficiently and improve the qualities of the stego-images.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126801355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a method for the automatic classification of MQAM signals in Rayleigh fading channel. The advantage of our method is that, by designing a feature vector which is composed of higher order moments, we do not have to acquire a priori knowledge of signal parameters, what is more, it is a simple, very low complexity, robust method. Computer simulations are made and the results show that our method can reach much better classification accuracy than the existing methods.
{"title":"A New Method for Identification of MQAM Signals in Rayleigh Fading Channel","authors":"M. Huang, Bingbing Li, B. Lan, Yanling Li","doi":"10.1109/ICCSN.2010.31","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.31","url":null,"abstract":"This paper presents a method for the automatic classification of MQAM signals in Rayleigh fading channel. The advantage of our method is that, by designing a feature vector which is composed of higher order moments, we do not have to acquire a priori knowledge of signal parameters, what is more, it is a simple, very low complexity, robust method. Computer simulations are made and the results show that our method can reach much better classification accuracy than the existing methods.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128073175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An early warning system on potential attacks from networks will enable network administrators or even automated network management software to take preventive measures. This is needed as we move towards maximizing the utilization of the network with new paradigms such as Web Services and Software As A Service. This paper introduces a novel approach through using Auto-Regressive Integrated Moving Average (ARIMA) technique to detect potential attacks that may occur in the network. The solution is able to provide feedback through its predictive capabilities and hence provide an early warning system. With the affirmative results, this technique can serve beyond the detection of Denial of Service (DoS) and with sufficient development; an automated defensive solution can be achieved.
网络潜在攻击的预警系统将使网络管理员甚至自动化网络管理软件能够采取预防措施。当我们通过Web服务和软件即服务(Software as A Service)等新模式实现对网络的最大利用时,这是需要的。本文介绍了一种利用自回归综合移动平均(ARIMA)技术检测网络中可能发生的潜在攻击的新方法。该解决方案能够通过其预测能力提供反馈,从而提供早期预警系统。研究结果表明,该技术不仅可以用于检测拒绝服务(DoS),而且具有充分的发展前景;可以实现自动化防御解决方案。
{"title":"ARIMA Based Network Anomaly Detection","authors":"A. H. Yaacob, I. Tan, S. Chien, Hongquan Tan","doi":"10.1109/ICCSN.2010.55","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.55","url":null,"abstract":"An early warning system on potential attacks from networks will enable network administrators or even automated network management software to take preventive measures. This is needed as we move towards maximizing the utilization of the network with new paradigms such as Web Services and Software As A Service. This paper introduces a novel approach through using Auto-Regressive Integrated Moving Average (ARIMA) technique to detect potential attacks that may occur in the network. The solution is able to provide feedback through its predictive capabilities and hence provide an early warning system. With the affirmative results, this technique can serve beyond the detection of Denial of Service (DoS) and with sufficient development; an automated defensive solution can be achieved.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130337450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vehicular Ad hoc Network (VANET) is a network of vehicles on the roads, of which the success of its applications is highly dependent upon the underlying security mechanism. The default trial asymmetric PKI/ECDSA security mechanism is known for its high computational cost, thus lacking applicability in life-critical safety messaging. Alternative security schemes, such as symmetric methods provide faster communication at the expense of reduced security. Hence, hybrid and hardware based solutions were proposed by researchers to ease the issue. However, these solutions either do not support the existing VANET PKI standard or have larger message size. In this paper, we present a hardware based security framework that uses both standard asymmetric PKI and symmetric cryptography for faster and secure safety message exchange. The proposed framework is expected to improve security mechanism in VANET by developing trust relationship among the neighboring nodes, hence forming trusted groups. The trust is established via Trusted Platform Module (TPM) and group communication.
车辆自组织网络(Vehicular Ad hoc Network, VANET)是一种由道路上的车辆组成的网络,其应用的成功与否高度依赖于其底层的安全机制。默认的试用非对称PKI/ECDSA安全机制以其高计算成本而闻名,因此在生命攸关的安全消息传递中缺乏适用性。其他安全方案,如对称方法,以降低安全性为代价提供更快的通信。因此,研究人员提出了基于混合和硬件的解决方案来缓解这个问题。然而,这些解决方案要么不支持现有的VANET PKI标准,要么具有更大的消息大小。在本文中,我们提出了一个基于硬件的安全框架,它使用标准的非对称PKI和对称加密来实现更快和更安全的安全消息交换。该框架有望通过在相邻节点之间建立信任关系,从而形成可信组,从而改善VANET中的安全机制。通过可信平台模块(Trusted Platform Module, TPM)和组通信建立信任。
{"title":"VANET Security Framework for Trusted Grouping Using TPM Hardware","authors":"A. Wagan, B. M. Mughal, H. Hasbullah","doi":"10.1109/ICCSN.2010.115","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.115","url":null,"abstract":"Vehicular Ad hoc Network (VANET) is a network of vehicles on the roads, of which the success of its applications is highly dependent upon the underlying security mechanism. The default trial asymmetric PKI/ECDSA security mechanism is known for its high computational cost, thus lacking applicability in life-critical safety messaging. Alternative security schemes, such as symmetric methods provide faster communication at the expense of reduced security. Hence, hybrid and hardware based solutions were proposed by researchers to ease the issue. However, these solutions either do not support the existing VANET PKI standard or have larger message size. In this paper, we present a hardware based security framework that uses both standard asymmetric PKI and symmetric cryptography for faster and secure safety message exchange. The proposed framework is expected to improve security mechanism in VANET by developing trust relationship among the neighboring nodes, hence forming trusted groups. The trust is established via Trusted Platform Module (TPM) and group communication.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130985871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The aim of this paper is to propose an imperceptible wavelet-based watermarking scheme. In our scheme, we use variation to define the degree of transparence of coefficients of LL band and further determine transparent coefficients of HL3 and LH3 bands. Then, the watermark is embedded into those coefficients. In addition, the modular operation is utilized during watermark embedding. In the experimental results, we simulate some common attacks on the watermarked image. It is shown that our scheme is robust against most attacks; moreover, the watermarked image is highly imperceptible.
{"title":"An Imperceptible Frequency-Domain Watermarking Scheme without Resorting to the Original Image","authors":"Shu-Fen Tu, Ching-Sheng Hsu","doi":"10.1109/ICCSN.2010.28","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.28","url":null,"abstract":"The aim of this paper is to propose an imperceptible wavelet-based watermarking scheme. In our scheme, we use variation to define the degree of transparence of coefficients of LL band and further determine transparent coefficients of HL3 and LH3 bands. Then, the watermark is embedded into those coefficients. In addition, the modular operation is utilized during watermark embedding. In the experimental results, we simulate some common attacks on the watermarked image. It is shown that our scheme is robust against most attacks; moreover, the watermarked image is highly imperceptible.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115745473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The multi-scenario topology of the wireless hybrid Ad Hoc networks is studied and a novel Cross Layer Power Efficient Cooperative Diversity Scheme (CL-PECDS) is proposed in this paper. The comparison and the predominance of the proposed scheme are demonstrated. With the help of the simulations, the relative energy consumption and the end-to-end blocking probability are all improved. The addressing ratio of success in the condition of the unchanged parameters and external information can be increased and the network can tolerate more hops to support reliable transportation by the proposed scheme.
{"title":"Cross Layer Power Efficient Cooperative Diversity Scheme for Wireless Hybrid Ad Hoc Networks","authors":"Yingji Zhong","doi":"10.1109/ICCSN.2010.70","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.70","url":null,"abstract":"The multi-scenario topology of the wireless hybrid Ad Hoc networks is studied and a novel Cross Layer Power Efficient Cooperative Diversity Scheme (CL-PECDS) is proposed in this paper. The comparison and the predominance of the proposed scheme are demonstrated. With the help of the simulations, the relative energy consumption and the end-to-end blocking probability are all improved. The addressing ratio of success in the condition of the unchanged parameters and external information can be increased and the network can tolerate more hops to support reliable transportation by the proposed scheme.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"296 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124275196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In wireless sensor networks (WSN) data transmission is usually performed by sensors in manner of multi-hop forwarding towards a central static control center (sink). A lot of cheap, low-powered and energy-limited sensors are deployed in the monitored area and some of these nodes closer to the sink node use up their energy more quickly than other nodes because they relay more packets. Although most of the sensor nodes have enough energy left to work, the energy consumption imbalance leads to connectivity holes and coverage holes, and finally the whole network failure. The main contributions of this paper include: (a) a new scheme based on multiple sink nodes is proposed to prolong the network lifetime and to reduce the response time. It is effective, especially in the target tracking applications, (b) the deployment strategy with given number of multiple sink nodes is explored in the grid sensor network, (c) Gene Expression Programming based Multiple Sink Nodes deployment algorithm (GEP-MSN) is proposed to optimally deploy multiple sink nodes over the monitored region, (d) a data transmission cost model (TCM) is introduced to measure the cost for optimizing during the transmission phase, (e) extensive simulations are conducted to show that the scheme can greatly extend the network lifetime by around 16.6% and 36.3% on average compared with two naive methods based on random distributed sink nodes.
{"title":"Optimal Multiple Sink Nodes Deployment in Wireless Sensor Networks Based on Gene Expression Programming","authors":"Shucheng Dai, Changjie Tang, Shaojie Qiao, Kaikuo Xu, Hongjun Li, Jun Zhu","doi":"10.1109/ICCSN.2010.33","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.33","url":null,"abstract":"In wireless sensor networks (WSN) data transmission is usually performed by sensors in manner of multi-hop forwarding towards a central static control center (sink). A lot of cheap, low-powered and energy-limited sensors are deployed in the monitored area and some of these nodes closer to the sink node use up their energy more quickly than other nodes because they relay more packets. Although most of the sensor nodes have enough energy left to work, the energy consumption imbalance leads to connectivity holes and coverage holes, and finally the whole network failure. The main contributions of this paper include: (a) a new scheme based on multiple sink nodes is proposed to prolong the network lifetime and to reduce the response time. It is effective, especially in the target tracking applications, (b) the deployment strategy with given number of multiple sink nodes is explored in the grid sensor network, (c) Gene Expression Programming based Multiple Sink Nodes deployment algorithm (GEP-MSN) is proposed to optimally deploy multiple sink nodes over the monitored region, (d) a data transmission cost model (TCM) is introduced to measure the cost for optimizing during the transmission phase, (e) extensive simulations are conducted to show that the scheme can greatly extend the network lifetime by around 16.6% and 36.3% on average compared with two naive methods based on random distributed sink nodes.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121292744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IT industry despite the wide use of most modern tools and technologies has been unable to achieve targeted success. Awry situations in projects have become routine matter. Besides technical other factors influencing software development activities also need to be considered. Software development and consultancy organizations must realize the importance of such technical and non-technical factors like client’s perspective, organizational environment, company policies and social infrastructure. Identification and managing such issues are more cumbersome than routine practical tasks. This paper focuses on one of the most important and critical cum technical factor client’s perspective. Elements comprising client’s perspective are identified and the spider web model is proposed to practice it. Real projects based evaluation is made. The results elaborate the client based practices. Client based practices would be an advent of new generation of processes to overcome IT industry dilemma.
{"title":"Client's Perspective: Realization as a New Generation Process for Software Project Development and Management","authors":"R. Akbar, M. Hassan, S. Safdar, M. Qureshi","doi":"10.1109/ICCSN.2010.96","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.96","url":null,"abstract":"IT industry despite the wide use of most modern tools and technologies has been unable to achieve targeted success. Awry situations in projects have become routine matter. Besides technical other factors influencing software development activities also need to be considered. Software development and consultancy organizations must realize the importance of such technical and non-technical factors like client’s perspective, organizational environment, company policies and social infrastructure. Identification and managing such issues are more cumbersome than routine practical tasks. This paper focuses on one of the most important and critical cum technical factor client’s perspective. Elements comprising client’s perspective are identified and the spider web model is proposed to practice it. Real projects based evaluation is made. The results elaborate the client based practices. Client based practices would be an advent of new generation of processes to overcome IT industry dilemma.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123314179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A new channel estimation method is proposed for orthogonal frequency division multiplexing (OFDM) mobile systems based on comb-type pilot. The proposed method utilizes adaptive-asymmetric filter in the transform domain. Asymmetric filter is proposed to reduce more noise for channel estimation based on the characteristic of transform-domain signal, and adaptive adjustment of the cutoff frequency is utilized to eliminate the error floor of channel estimation at high signal-to-noise ratios. Signal-to-noise ratio estimation is implemented in the transform domain. We investigate the performance of the proposed method by measuring symbol error rate with 16QAM as the modulation. Simulation results show that the proposed method outperforms the conventional transform-domain interpolation and the frequency-domain low-pass interpolation.
{"title":"A New Channel Estimation Method for OFDM Systems Based on Adaptive-Asymmetric Filter in the Transform Domain","authors":"Shih-Lun Feng, Zhang Eryang, Wang Chen","doi":"10.1109/ICCSN.2010.100","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.100","url":null,"abstract":"A new channel estimation method is proposed for orthogonal frequency division multiplexing (OFDM) mobile systems based on comb-type pilot. The proposed method utilizes adaptive-asymmetric filter in the transform domain. Asymmetric filter is proposed to reduce more noise for channel estimation based on the characteristic of transform-domain signal, and adaptive adjustment of the cutoff frequency is utilized to eliminate the error floor of channel estimation at high signal-to-noise ratios. Signal-to-noise ratio estimation is implemented in the transform domain. We investigate the performance of the proposed method by measuring symbol error rate with 16QAM as the modulation. Simulation results show that the proposed method outperforms the conventional transform-domain interpolation and the frequency-domain low-pass interpolation.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122649956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}