首页 > 最新文献

J. Inform. and Commun. Convergence Engineering最新文献

英文 中文
Low Power Time Synchronization for Wireless Sensor Networks Using Density-Driven Scheduling 基于密度驱动调度的无线传感器网络低功耗时间同步
Pub Date : 2018-06-01 DOI: 10.6109/jicce.2018.16.2.84
HoChul Lim, Hyungwon Kim
{"title":"Low Power Time Synchronization for Wireless Sensor Networks Using Density-Driven Scheduling","authors":"HoChul Lim, Hyungwon Kim","doi":"10.6109/jicce.2018.16.2.84","DOIUrl":"https://doi.org/10.6109/jicce.2018.16.2.84","url":null,"abstract":"","PeriodicalId":272551,"journal":{"name":"J. Inform. and Commun. Convergence Engineering","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132742372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Smart Home System Using Internet of Things 使用物联网的智能家居系统
Pub Date : 2018-03-29 DOI: 10.6109/jicce.2018.16.1.60
Leo Willyanto Santoso, Resmana Lim, Kevin Trisnajaya
The Internet of Things (IoT) is happening now. By implementing IoT, we can build smart home system. Smart home is an application that is a combination of technology and services that specialize in the home environment with specific functions aimed at improving the efficiency, comfort and security of the occupants. Smart homes filled with connected products are loaded with possibilities to make our lives easier, more convenient, and more comfortable. This intelligent home system uses a microcontroller to process functions that provided by smart home system, such functions as RFID for door access and PIR sensors for motion detection. By using Android users could control the sensors anytime and anywhere. Microcontroller used is Arduino IDE with WeMos D1R2 board. Based on the testing process, there was a successful communication between the components of the device, sensors, and Android devices. Users could open or close the solenoid, users can also turn off or turn on electronic devices using Android.
物联网(IoT)正在发生。通过实施物联网,我们可以构建智能家居系统。智能家居是一种应用,它是一种技术和服务的结合,专门针对家庭环境,具有特定的功能,旨在提高居住者的效率,舒适度和安全性。充满互联产品的智能家居充满了让我们的生活更轻松、更方便、更舒适的可能性。该智能家居系统使用微控制器来处理智能家居系统提供的功能,例如用于门禁的RFID和用于运动检测的PIR传感器。通过使用安卓系统,用户可以随时随地控制传感器。微控制器使用Arduino IDE与WeMos D1R2板。根据测试过程,设备组件、传感器和Android设备之间成功通信。用户可以打开或关闭螺线管,用户也可以使用Android关闭或打开电子设备。
{"title":"Smart Home System Using Internet of Things","authors":"Leo Willyanto Santoso, Resmana Lim, Kevin Trisnajaya","doi":"10.6109/jicce.2018.16.1.60","DOIUrl":"https://doi.org/10.6109/jicce.2018.16.1.60","url":null,"abstract":"The Internet of Things (IoT) is happening now. By implementing IoT, we can build smart home system. Smart home is an application that is a combination of technology and services that specialize in the home environment with specific functions aimed at improving the efficiency, comfort and security of the occupants. Smart homes filled with connected products are loaded with possibilities to make our lives easier, more convenient, and more comfortable. This intelligent home system uses a \u0000microcontroller to process functions that provided by smart home system, such functions as RFID for door access and PIR sensors for motion detection. By using Android users could control the sensors anytime and anywhere. Microcontroller used is Arduino IDE with WeMos D1R2 board. Based on the testing process, there was a successful communication between the components of the device, sensors, and Android devices. Users could open or close the solenoid, users can also turn off or turn \u0000on electronic devices using Android.","PeriodicalId":272551,"journal":{"name":"J. Inform. and Commun. Convergence Engineering","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127030400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Odoo Data Mining Module Using Market Basket Analysis 基于市场购物篮分析的Odoo数据挖掘模块
Pub Date : 2018-03-29 DOI: 10.6109/jicce.2018.16.1.52
Y. Yulia, G. S. Budhi, Stefani Natalia Hendratha
Odoo is an enterprise resource planning information system providing modules to support the basic business function in companies. This research will look into the development of an additional module at Odoo. This module is a data mining module using Market Basket Analysis (MBA) using FP-Growth algorithm in managing OLTP of sales transaction to be useful information for users to improve the analysis of company business strategy. The FP-Growth algorithm used in the application was able to produce multidimensional association rules. The company will know more about their sales and customers� buying habits. Performing sales trend analysis will give a valuable insight into the inner-workings of the business. The testing of the module is using the data from X Supermarket. The final result of this module is generated from a data mining process in the form of association rule. The rule is presented in narrative and graphical form to be understood easier.
Odoo是一个企业资源规划信息系统,提供支持公司基本业务功能的模块。这项研究将着眼于在Odoo开发一个额外的模块。本模块是一个数据挖掘模块,利用市场购物篮分析(MBA),利用FP-Growth算法管理销售交易的OLTP,为用户提供有用的信息,提高对公司经营战略的分析。应用程序中使用的FP-Growth算法能够生成多维关联规则。公司将更了解他们的销售和客户的购买习惯。进行销售趋势分析将对企业的内部运作提供有价值的见解。模块的测试使用的是来自X超市的数据。该模块的最终结果以关联规则的形式通过数据挖掘过程生成。该规则以叙述和图形形式呈现,以便更容易理解。
{"title":"Odoo Data Mining Module Using Market Basket Analysis","authors":"Y. Yulia, G. S. Budhi, Stefani Natalia Hendratha","doi":"10.6109/jicce.2018.16.1.52","DOIUrl":"https://doi.org/10.6109/jicce.2018.16.1.52","url":null,"abstract":"Odoo is an enterprise resource planning information system providing modules to support the basic business function in \u0000companies. This research will look into the development of an additional module at Odoo. This module is a data mining module \u0000using Market Basket Analysis (MBA) using FP-Growth algorithm in managing OLTP of sales transaction to be useful \u0000information for users to improve the analysis of company business strategy. The FP-Growth algorithm used in the application \u0000was able to produce multidimensional association rules. The company will know more about their sales and customers� buying \u0000habits. Performing sales trend analysis will give a valuable insight into the inner-workings of the business. The testing of the \u0000module is using the data from X Supermarket. The final result of this module is generated from a data mining process in the form \u0000of association rule. The rule is presented in narrative and graphical form to be understood easier.","PeriodicalId":272551,"journal":{"name":"J. Inform. and Commun. Convergence Engineering","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130692844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Seafarers Walking on an Unstable Platform: Comparisons of Time and Frequency Domain Analyses for Gait Event Detection 海员在不稳定平台上行走:步态事件检测的时域和频域分析比较
Pub Date : 2017-12-01 DOI: 10.6109/jicce.2017.15.4.244
Ik-Hyun Youn, Jungyeon Choi, Jong-Hoon Youn
{"title":"Seafarers Walking on an Unstable Platform: Comparisons of Time and Frequency Domain Analyses for Gait Event Detection","authors":"Ik-Hyun Youn, Jungyeon Choi, Jong-Hoon Youn","doi":"10.6109/jicce.2017.15.4.244","DOIUrl":"https://doi.org/10.6109/jicce.2017.15.4.244","url":null,"abstract":"","PeriodicalId":272551,"journal":{"name":"J. Inform. and Commun. Convergence Engineering","volume":"86 21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126288575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Navigator Lookout Activity Classification Using Wearable Accelerometers 使用可穿戴式加速度计进行导航了望活动分类
Pub Date : 2017-09-01 DOI: 10.6109/jicce.2017.15.3.182
Ik-Hyun Youn, Jong-Hoon Youn
{"title":"Navigator Lookout Activity Classification Using Wearable Accelerometers","authors":"Ik-Hyun Youn, Jong-Hoon Youn","doi":"10.6109/jicce.2017.15.3.182","DOIUrl":"https://doi.org/10.6109/jicce.2017.15.3.182","url":null,"abstract":"","PeriodicalId":272551,"journal":{"name":"J. Inform. and Commun. Convergence Engineering","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124508496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Comparative Study of Twist Property in KSS Curves of Embedding Degree 16 and 18 from the Implementation Perspective 从实现角度比较嵌入度为16和18的KSS曲线的扭转特性
Pub Date : 2017-06-01 DOI: 10.6109/jicce.2017.15.2.97
Md. Al-Amin Khandaker, Taehwan Park, Y. Nogami, Howon Kim
Implementation of faster pairing calculation is the basis of efficient pairing-based cryptographic protocol implementation. Generally, pairing is a costly operation carried out over the extension field of degree k ≥ 12. But the twist property of the pairing friendly curve allows us to calculate pairing over the sub-field twisted curve, where the extension degree becomes k/d and twist degree d = 2, 3, 4, 6. The calculation cost is reduced substantially by twisting but it makes the discrete logarithm problem easier if the curve parameters are not carefully chosen. Therefore, this paper considers the most recent parameters setting presented by Barbulescu and Duquesne [1] for pairing-based cryptography; that are secure enough for 128bit security level; to explicitly show the quartic twist (d = 4) and sextic twist (d = 6) mapping between the isomorphic rational point groups for KSS (Kachisa-Schaefer-Scott) curve of embedding degree k = 16 and k = 18, receptively. This paper also evaluates the performance enhancement of the obtained twisted mapping by comparing the elliptic curve scalar multiplications.
实现更快的配对计算是高效实现基于配对的加密协议的基础。一般来说,配对是在k≥12度的可拓域上进行的代价高昂的操作。但根据配对友好曲线的扭转特性,我们可以在子场扭转曲线上计算配对,其中扩展度为k/d,扭转度d = 2,3,4,6。扭转可以大大减少计算成本,但如果曲线参数选择不仔细,则会使离散对数问题变得容易。因此,本文考虑了Barbulescu和Duquesne[1]提出的基于配对密码的最新参数设置;这是足够安全的128位安全级别;显式地表示嵌入度为k = 16和k = 18的Kachisa-Schaefer-Scott曲线的同构有理点群之间的四次捻(d = 4)和六次捻(d = 6)映射。本文还通过比较椭圆曲线标量乘法来评价所得到的扭曲映射的性能增强。
{"title":"A Comparative Study of Twist Property in KSS Curves of Embedding Degree 16 and 18 from the Implementation Perspective","authors":"Md. Al-Amin Khandaker, Taehwan Park, Y. Nogami, Howon Kim","doi":"10.6109/jicce.2017.15.2.97","DOIUrl":"https://doi.org/10.6109/jicce.2017.15.2.97","url":null,"abstract":"Implementation of faster pairing calculation is the basis of efficient pairing-based cryptographic protocol implementation. Generally, pairing is a costly operation carried out over the extension field of degree k ≥ 12. But the twist property of the pairing friendly curve allows us to calculate pairing over the sub-field twisted curve, where the extension degree becomes k/d and twist degree d = 2, 3, 4, 6. The calculation cost is reduced substantially by twisting but it makes the discrete logarithm problem easier if the curve parameters are not carefully chosen. Therefore, this paper considers the most recent parameters setting presented by Barbulescu and Duquesne [1] for pairing-based cryptography; that are secure enough for 128bit security level; to explicitly show the quartic twist (d = 4) and sextic twist (d = 6) mapping between the isomorphic rational point groups for KSS (Kachisa-Schaefer-Scott) curve of embedding degree k = 16 and k = 18, receptively. This paper also evaluates the performance enhancement of the obtained twisted mapping by comparing the elliptic curve scalar multiplications.","PeriodicalId":272551,"journal":{"name":"J. Inform. and Commun. Convergence Engineering","volume":"424 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116049573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on UI Design of Social Networking Service Messenger by Using Case Analysis Model 基于案例分析模型的社交网络服务信使UI设计研究
Pub Date : 2017-06-01 DOI: 10.6109/jicce.2017.15.2.104
Jong-Hoon Youn, Young-Ho Seo, Moon-Seok Oh
{"title":"A Study on UI Design of Social Networking Service Messenger by Using Case Analysis Model","authors":"Jong-Hoon Youn, Young-Ho Seo, Moon-Seok Oh","doi":"10.6109/jicce.2017.15.2.104","DOIUrl":"https://doi.org/10.6109/jicce.2017.15.2.104","url":null,"abstract":"","PeriodicalId":272551,"journal":{"name":"J. Inform. and Commun. Convergence Engineering","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121212498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Adaptive and Prioritized Random Access and Resource Allocation Schemes for Dynamic TDMA/TDD Protocols 动态TDMA/TDD协议的自适应优先随机接入和资源分配方案
Pub Date : 2017-03-01 DOI: 10.6109/jicce.2017.15.1.28
Hyun-Ho Choi
The medium access control (MAC) protocol based on dynamic time division multiple access/time division duplex (TDMA/TDD) is responsible for random access control and radio resource allocation in dynamic traffic environments. These functions of random access and resource allocation are very important to prevent wastage of resources and improve MAC performance according to various network conditions. In this paper, we propose new random access and resource allocation schemes to guarantee quality of service (QoS) and provide priority services in a dynamic TDMA/TDD system. First, for the QoS guarantee, we propose an adaptive random access and resource allocation scheme by introducing an access probability. Second, for providing priority service, we propose a priority-based random access and resource allocation scheme by extending the first adaptive scheme in both a centralized and a distributed manner. The analysis and simulation results show that the proposed MAC protocol outperforms the legacy MAC protocol using a simple binary exponential backoff algorithm, and provides good differential performance according to priorities with respect to the throughput and delay.
基于动态时分多址/时分双工(TDMA/TDD)的介质访问控制(MAC)协议负责动态业务环境下的随机访问控制和无线电资源分配。这些随机访问和资源分配功能对于防止资源浪费和根据各种网络条件提高MAC性能非常重要。为了在动态TDMA/TDD系统中保证服务质量和提供优先级服务,我们提出了新的随机接入和资源分配方案。首先,为了保证服务质量,我们提出了一种引入接入概率的自适应随机接入和资源分配方案。其次,为了提供优先级服务,我们通过对第一种自适应方案进行集中和分布式扩展,提出了基于优先级的随机访问和资源分配方案。分析和仿真结果表明,所提出的MAC协议使用简单的二进制指数回退算法优于传统的MAC协议,并且在吞吐量和延迟方面根据优先级提供了良好的差分性能。
{"title":"Adaptive and Prioritized Random Access and Resource Allocation Schemes for Dynamic TDMA/TDD Protocols","authors":"Hyun-Ho Choi","doi":"10.6109/jicce.2017.15.1.28","DOIUrl":"https://doi.org/10.6109/jicce.2017.15.1.28","url":null,"abstract":"The medium access control (MAC) protocol based on dynamic time division multiple access/time division duplex (TDMA/TDD) is responsible for random access control and radio resource allocation in dynamic traffic environments. These functions of random access and resource allocation are very important to prevent wastage of resources and improve MAC performance according to various network conditions. In this paper, we propose new random access and resource allocation schemes to guarantee quality of service (QoS) and provide priority services in a dynamic TDMA/TDD system. First, for the QoS guarantee, we propose an adaptive random access and resource allocation scheme by introducing an access probability. Second, for providing priority service, we propose a priority-based random access and resource allocation scheme by extending the first adaptive scheme in both a centralized and a distributed manner. The analysis and simulation results show that the proposed MAC protocol outperforms the legacy MAC protocol using a simple binary exponential backoff algorithm, and provides good differential performance according to priorities with respect to the throughput and delay.","PeriodicalId":272551,"journal":{"name":"J. Inform. and Commun. Convergence Engineering","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123112785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Outage Analysis and Power Allocation for Distributed Space-Time Coding-Based Cooperative Systems over Rayleigh Fading Channels 基于瑞利衰落信道的分布式空时编码协同系统的停电分析与功率分配
Pub Date : 2017-03-01 DOI: 10.6109/jicce.2017.15.1.21
In-Ho Lee
In this research, we study the outage probability for distributed space-time coding-based cooperative (DSTC) systems with amplify-and-forward relaying over Rayleigh fading channels with a high temporal correlation where the direct link between the source and the destination is available. In particular, we derive the upper and lower bounds of the outage probability as well as their corresponding asymptotic expressions. In addition, using only the average channel powers for the source-to-relay and relay-to-destination links, we propose an efficient power allocation scheme between the source and the relay to minimize the asymptotic upper bound of the outage probability. Through a numerical investigation, we verify the analytical expressions as well as the effectiveness of the proposed efficient power allocation. The numerical results show that the lower and upper bounds tightly correspond to the exact outage probability, and the proposed efficient power allocation scheme provides an outage probability similar to that of the optimal power allocation scheme that minimizes the exact outage probability.
在本研究中,我们研究了在具有高时间相关性的瑞利衰落信道上具有放大转发中继的分布式空时编码合作(DSTC)系统的中断概率,其中源和目标之间存在直接链路。特别地,我们导出了中断概率的上界和下界及其相应的渐近表达式。此外,仅使用源到中继和中继到目的链路的平均信道功率,我们提出了一种在源和中继之间有效的功率分配方案,以最小化停电概率的渐近上界。通过数值研究,验证了解析表达式以及所提出的高效功率分配的有效性。数值计算结果表明,下上界与精确停电概率紧密对应,所提出的有效功率分配方案提供了与精确停电概率最小化的最优功率分配方案相似的停电概率。
{"title":"Outage Analysis and Power Allocation for Distributed Space-Time Coding-Based Cooperative Systems over Rayleigh Fading Channels","authors":"In-Ho Lee","doi":"10.6109/jicce.2017.15.1.21","DOIUrl":"https://doi.org/10.6109/jicce.2017.15.1.21","url":null,"abstract":"In this research, we study the outage probability for distributed space-time coding-based cooperative (DSTC) systems with amplify-and-forward relaying over Rayleigh fading channels with a high temporal correlation where the direct link between the source and the destination is available. In particular, we derive the upper and lower bounds of the outage probability as well as their corresponding asymptotic expressions. In addition, using only the average channel powers for the source-to-relay and relay-to-destination links, we propose an efficient power allocation scheme between the source and the relay to minimize the asymptotic upper bound of the outage probability. Through a numerical investigation, we verify the analytical expressions as well as the effectiveness of the proposed efficient power allocation. The numerical results show that the lower and upper bounds tightly correspond to the exact outage probability, and the proposed efficient power allocation scheme provides an outage probability similar to that of the optimal power allocation scheme that minimizes the exact outage probability.","PeriodicalId":272551,"journal":{"name":"J. Inform. and Commun. Convergence Engineering","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122448993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Survey on Physical Layer Security in Downlink Networks 下行网络物理层安全研究
Pub Date : 2017-03-01 DOI: 10.6109/jicce.2017.15.1.14
M. Abbas, Jun-Pyo Hong
In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the availability of CSI of eavesdroppers significantly affects not only the beamforming strategy but also the user scheduling. Eventually, we provide intuitive information on the effect of CSI on the secrecy performance by considering three scenarios: perfect, imperfect, and absence of eavesdropper’s CSI at the BS.
本文讨论了下行网络中的物理层安全技术,包括窃听器。使用物理层安全的主要目标是在被动或主动窃听者试图窃听信息或扰乱网络稳定的情况下,将完全安全的消息从发送者传递到预期的接收者。在下行网络中,基于到终端信道的随机特性,机会用户调度可以作为增强物理层安全性的附加工具加以利用。介绍了用户调度策略,并根据基站不同层次的信道状态信息(CSI)讨论了相应的性能。研究表明,窃听器CSI的可用性不仅会显著影响波束形成策略,还会影响用户调度。最后,通过考虑三种情况:完全、不完全和不存在窃听者的CSI,我们提供了CSI对保密性能影响的直观信息。
{"title":"Survey on Physical Layer Security in Downlink Networks","authors":"M. Abbas, Jun-Pyo Hong","doi":"10.6109/jicce.2017.15.1.14","DOIUrl":"https://doi.org/10.6109/jicce.2017.15.1.14","url":null,"abstract":"In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the availability of CSI of eavesdroppers significantly affects not only the beamforming strategy but also the user scheduling. Eventually, we provide intuitive information on the effect of CSI on the secrecy performance by considering three scenarios: perfect, imperfect, and absence of eavesdropper’s CSI at the BS.","PeriodicalId":272551,"journal":{"name":"J. Inform. and Commun. Convergence Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125836211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
J. Inform. and Commun. Convergence Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1