Pub Date : 2014-07-28DOI: 10.1109/CCNC.2014.6866622
Lei Chen, Guangrong Yue, Xiantao Cheng, Shaoqian Li
A time-domain golay complementary sequences based frequency-dependent I/Q imbalance compensation scheme for receiver is presented. By utilizing property of golay sequences, the signal and its conjugate interference in preamble are separated by correlation and used to estimate the equivalent channel of I branch and Q branch. After that, a filter which contains the difference of those equivalent channels is estimated by Least Square Error (LSE) method and adopted to compensate the imbalance. The compensator structure is designed to fit the scheme so that the phase imbalance is not needed to estimate separately during the compensation. The provided scheme could be effectively applied in standards like 802.15.3c or 802.11ad where golay sequence is adopted as preamble of a frame so that there is no cost in frame structure. All the estimation and compensation are operated in time-domain thus no FFT operation is needed. Also, no further information about the channel is required, which ensures the imbalance distortion could be eliminated right after synchronization in the receiver before channel estimation and equalization. Thus, there is no strict on the algorithms of channel estimation and equalization. The performance of the scheme is evaluated by computer simulation and compared with existed algorithms. The results show that it has effectively eliminated the influence of the imbalance at a low complexity.
{"title":"Time-domain frequency-dependent I/Q imbalance compensation based on golay sequence","authors":"Lei Chen, Guangrong Yue, Xiantao Cheng, Shaoqian Li","doi":"10.1109/CCNC.2014.6866622","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6866622","url":null,"abstract":"A time-domain golay complementary sequences based frequency-dependent I/Q imbalance compensation scheme for receiver is presented. By utilizing property of golay sequences, the signal and its conjugate interference in preamble are separated by correlation and used to estimate the equivalent channel of I branch and Q branch. After that, a filter which contains the difference of those equivalent channels is estimated by Least Square Error (LSE) method and adopted to compensate the imbalance. The compensator structure is designed to fit the scheme so that the phase imbalance is not needed to estimate separately during the compensation. The provided scheme could be effectively applied in standards like 802.15.3c or 802.11ad where golay sequence is adopted as preamble of a frame so that there is no cost in frame structure. All the estimation and compensation are operated in time-domain thus no FFT operation is needed. Also, no further information about the channel is required, which ensures the imbalance distortion could be eliminated right after synchronization in the receiver before channel estimation and equalization. Thus, there is no strict on the algorithms of channel estimation and equalization. The performance of the scheme is evaluated by computer simulation and compared with existed algorithms. The results show that it has effectively eliminated the influence of the imbalance at a low complexity.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122336651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-28DOI: 10.1109/CCNC.2014.6866599
M. Zolotukhin, T. Hämäläinen
Today, rapid growth in the amount of malicious software is causing a serious global security threat. Unfortunately, widespread signature-based malware detection mechanisms are not able to deal with constantly appearing new types of malware and variants of existing ones, until an instance of this malware has damaged several computers or networks. In this research, we apply an anomaly detection approach which can cope with the problem of new malware detection. First, executable files are analyzed in order to extract operation code sequences and then n-gram models are employed to discover essential features from these sequences. A clustering algorithm based on the iterative usage of support vector machines and support vector data descriptions is applied to analyze feature vectors obtained and to build a benign software behavior model. Finally, this model is used to detect malicious executables within new files. The scheme proposed allows one to detect malware unseen previously. The simulation results presented show that the method results in a higher accuracy rate than that of the existing analogues.
{"title":"Detection of zero-day malware based on the analysis of opcode sequences","authors":"M. Zolotukhin, T. Hämäläinen","doi":"10.1109/CCNC.2014.6866599","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6866599","url":null,"abstract":"Today, rapid growth in the amount of malicious software is causing a serious global security threat. Unfortunately, widespread signature-based malware detection mechanisms are not able to deal with constantly appearing new types of malware and variants of existing ones, until an instance of this malware has damaged several computers or networks. In this research, we apply an anomaly detection approach which can cope with the problem of new malware detection. First, executable files are analyzed in order to extract operation code sequences and then n-gram models are employed to discover essential features from these sequences. A clustering algorithm based on the iterative usage of support vector machines and support vector data descriptions is applied to analyze feature vectors obtained and to build a benign software behavior model. Finally, this model is used to detect malicious executables within new files. The scheme proposed allows one to detect malware unseen previously. The simulation results presented show that the method results in a higher accuracy rate than that of the existing analogues.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129726804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-28DOI: 10.1109/CCNC.2014.6866626
Faisal Hossain, Arshad M. Chowdhury
We propose and analyze a handoff scheme using the concept of a Virtual Cell to ensure seamless connectivity in 60 GHz Radio over Fiber network. Simulation based performance analysis showed 33.7% better Throughput efficiency when compared to using a Moving Extended Cell in a small sized network. Simultaneously, user mobility speed was monitored and an optimum operating range is prescribed.
{"title":"User mobility prediction based handoff scheme for 60 GHz radio over fiber network","authors":"Faisal Hossain, Arshad M. Chowdhury","doi":"10.1109/CCNC.2014.6866626","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6866626","url":null,"abstract":"We propose and analyze a handoff scheme using the concept of a Virtual Cell to ensure seamless connectivity in 60 GHz Radio over Fiber network. Simulation based performance analysis showed 33.7% better Throughput efficiency when compared to using a Moving Extended Cell in a small sized network. Simultaneously, user mobility speed was monitored and an optimum operating range is prescribed.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121494419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-28DOI: 10.1109/CCNC.2014.6866582
Seung Keun Yoon, Sang Joon Kim, Ui-Kun Kwon, Jae Chun Lee
Near Field Communication (NFC) applied with resonant coupling would lead to an innovative improvements such as power transfer efficiency and robustness, which can be most suitable for medical applications. However, there are several technical issues of the conventional NFC system that makes it difficult to apply resonant coupling. One of the critical issues is that the system performance becomes excessively sensitive to impedance matching and bandwidth of its antenna. In this paper, we propose a novel high-Q NFC system that overcomes the limitations of applying resonant coupling to conventional NFC system. As a result, the high-Q NFC system showed remarkable improvement in energy efficiency. Moreover, the high-Q NFC system showed perfect compatibility with conventional NFC system, while it quadrupled the power transmission efficiency.
{"title":"Advanced near field communication with resonant coupling","authors":"Seung Keun Yoon, Sang Joon Kim, Ui-Kun Kwon, Jae Chun Lee","doi":"10.1109/CCNC.2014.6866582","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6866582","url":null,"abstract":"Near Field Communication (NFC) applied with resonant coupling would lead to an innovative improvements such as power transfer efficiency and robustness, which can be most suitable for medical applications. However, there are several technical issues of the conventional NFC system that makes it difficult to apply resonant coupling. One of the critical issues is that the system performance becomes excessively sensitive to impedance matching and bandwidth of its antenna. In this paper, we propose a novel high-Q NFC system that overcomes the limitations of applying resonant coupling to conventional NFC system. As a result, the high-Q NFC system showed remarkable improvement in energy efficiency. Moreover, the high-Q NFC system showed perfect compatibility with conventional NFC system, while it quadrupled the power transmission efficiency.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115608749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-28DOI: 10.1109/CCNC.2014.6866555
T. Phan, Swaroop Kalasapur, A. Kunjithapatham
Modern smartphones offer a rich selection of onboard sensors, where sensor access is typically performed through API calls provided by the phone's operating system. In this paper we evaluate the viability of implementing sensor processing entirely in the Web browser layer with Web SocialSense, a JavaScript framework for Tizen smartphones that uses a graph topology-based paradigm. This framework enables programmers to write personalized, context-aware applications that can dynamically fuse time-series signals from physical sensors (such as the accelerometer and geolocation services) and social software sensors (such as social network services and personal information management applications). To demonstrate the framework we implemented components for physical sensing and social software sensing to drive two context-aware applications, ActVertisements and Social Map.
{"title":"Sensor fusion of physical and social data using Web SocialSense on smartphone mobile browsers","authors":"T. Phan, Swaroop Kalasapur, A. Kunjithapatham","doi":"10.1109/CCNC.2014.6866555","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6866555","url":null,"abstract":"Modern smartphones offer a rich selection of onboard sensors, where sensor access is typically performed through API calls provided by the phone's operating system. In this paper we evaluate the viability of implementing sensor processing entirely in the Web browser layer with Web SocialSense, a JavaScript framework for Tizen smartphones that uses a graph topology-based paradigm. This framework enables programmers to write personalized, context-aware applications that can dynamically fuse time-series signals from physical sensors (such as the accelerometer and geolocation services) and social software sensors (such as social network services and personal information management applications). To demonstrate the framework we implemented components for physical sensing and social software sensing to drive two context-aware applications, ActVertisements and Social Map.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127250564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-28DOI: 10.1109/CCNC.2014.6866618
M. Mokhtar, Ahmad Gomaa, N. Al-Dhahir
We analyze the EVM performance of OFDM-based relay-assisted amplify-and-forward systems in the presence of I/Q imbalance. We show analytically that the MRC detector suffers from an error floor due to mutual interference between image subcarriers. We prove analytically that a simple zero-forcing two-tap per subcarrier equalizer eliminates this error floor. Simulation results demonstrate its significant performance gain over MRC detection for different I/Q imbalance levels, SNR levels, and relay positions.
{"title":"EVM analysis of amplify-and-forward relaying under I/Q imbalance","authors":"M. Mokhtar, Ahmad Gomaa, N. Al-Dhahir","doi":"10.1109/CCNC.2014.6866618","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6866618","url":null,"abstract":"We analyze the EVM performance of OFDM-based relay-assisted amplify-and-forward systems in the presence of I/Q imbalance. We show analytically that the MRC detector suffers from an error floor due to mutual interference between image subcarriers. We prove analytically that a simple zero-forcing two-tap per subcarrier equalizer eliminates this error floor. Simulation results demonstrate its significant performance gain over MRC detection for different I/Q imbalance levels, SNR levels, and relay positions.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126847463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-28DOI: 10.1109/CCNC.2014.6866632
Ehab Salahat
In this paper, we present a unified performance analysis of wireless communication over fading channels in terms of the Average Symbol Error Rates (ASER), Average Channel Capacity (ACC) and Moment Generating Function (MGF). We derive a simple and accurate exact and approximate closed-form expression for ASER, encapsulating all types of coherent digital modulations schemes, and exact expressions for the ACC and MGF, for the new fading distribution that has not been studied before, the η-λ-μ generalized fading, which accurately characterizes, thanks to the remarkable flexibility of the named parameters, the non-homogeneous nature of the propagation medium, including the λ-μ, the η-μ, the Hoyt, the Rice, the Nakagami-m, the Rayleigh, the Gamma, the Exponential, and the One-sided Gaussian fading distributions as special cases. The derived expressions are analytically-traceable and convenient to handle both numerically and analytically. Monte Carlo simulations and existing solutions for the special cases of this fading have been used to validate the derived expressions, where an excellent match is achieved.
{"title":"A unified performance analysis of wireless communications over η-λ-μ generalized fading channels","authors":"Ehab Salahat","doi":"10.1109/CCNC.2014.6866632","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6866632","url":null,"abstract":"In this paper, we present a unified performance analysis of wireless communication over fading channels in terms of the Average Symbol Error Rates (ASER), Average Channel Capacity (ACC) and Moment Generating Function (MGF). We derive a simple and accurate exact and approximate closed-form expression for ASER, encapsulating all types of coherent digital modulations schemes, and exact expressions for the ACC and MGF, for the new fading distribution that has not been studied before, the η-λ-μ generalized fading, which accurately characterizes, thanks to the remarkable flexibility of the named parameters, the non-homogeneous nature of the propagation medium, including the λ-μ, the η-μ, the Hoyt, the Rice, the Nakagami-m, the Rayleigh, the Gamma, the Exponential, and the One-sided Gaussian fading distributions as special cases. The derived expressions are analytically-traceable and convenient to handle both numerically and analytically. Monte Carlo simulations and existing solutions for the special cases of this fading have been used to validate the derived expressions, where an excellent match is achieved.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126939598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-28DOI: 10.1109/CCNC.2014.6866560
Lili Wang, Jianfeng Guan, I. You, Huachun Zhou, D. Gao, Kangbin Yim, Pankoo Kim
As a promising mobility protocol, Proxy Mobile IPv6 (PMIPv6) can provide mobility support without the involvement of the mobile nodes (MNs). It depends on the Local Mobility Anchor (LMA) and Mobility Access Gateway (MAG) to emulate the home network for the attached MNs. Based on this design principle, PMIPv6 works well only for small scale networks. However, with the rapid increase of the MNs as well as the huge traffic loads, PMIPv6 as a centralized mobility management protocol in which both the location management and dada forwarding are performed by the LMA, will induce lots of limitations, such as non-optimal routing, single point of failure, scalability and so on. Therefore, a trend to distributed mobility management (DMM) is popular, and several distributed solutions for PMIPv6 have been proposed until now. In this paper, we survey the different schemes of DMM and focus on the related solutions for PMIPv6 by qualitative analysis, and conclude the remaining challenges and open issues for future development.
代理移动IPv6 (Proxy Mobile IPv6, PMIPv6)是一种很有前途的移动协议,它可以在不需要移动节点参与的情况下提供移动支持。它依赖于本地移动锚(LMA)和移动接入网闸(MAG)来模拟所连接的mn的家庭网络。基于这一设计原则,PMIPv6仅适用于小规模网络。然而,随着MNs的快速增加和巨大的流量负载,PMIPv6作为一种由LMA进行位置管理和数据转发的集中式移动管理协议,存在路由非最优、单点故障、可扩展性等诸多局限性。因此,分布式移动管理(DMM)成为一种流行趋势,目前已经提出了几种针对PMIPv6的分布式解决方案。本文综述了DMM的不同方案,并对PMIPv6的相关解决方案进行了定性分析,总结了未来发展面临的挑战和有待解决的问题。
{"title":"Survey on distributed mobility management schemes for Proxy mobile IPv6","authors":"Lili Wang, Jianfeng Guan, I. You, Huachun Zhou, D. Gao, Kangbin Yim, Pankoo Kim","doi":"10.1109/CCNC.2014.6866560","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6866560","url":null,"abstract":"As a promising mobility protocol, Proxy Mobile IPv6 (PMIPv6) can provide mobility support without the involvement of the mobile nodes (MNs). It depends on the Local Mobility Anchor (LMA) and Mobility Access Gateway (MAG) to emulate the home network for the attached MNs. Based on this design principle, PMIPv6 works well only for small scale networks. However, with the rapid increase of the MNs as well as the huge traffic loads, PMIPv6 as a centralized mobility management protocol in which both the location management and dada forwarding are performed by the LMA, will induce lots of limitations, such as non-optimal routing, single point of failure, scalability and so on. Therefore, a trend to distributed mobility management (DMM) is popular, and several distributed solutions for PMIPv6 have been proposed until now. In this paper, we survey the different schemes of DMM and focus on the related solutions for PMIPv6 by qualitative analysis, and conclude the remaining challenges and open issues for future development.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126669721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-28DOI: 10.1109/CCNC.2014.6866554
K. Naito, K. Mori, Hideo Kobayashi, Kazuma Kamienoo, Hidekazu Suzuki, A. Watanabe
Smartphones are a new type of mobile devices that users can install additional mobile software easily. In the almost all smartphone applications, client-server model is used because end-to-end communication is prevented by NAT routers. Recently, some smartphone applications provide real time services such as voice and video communication, online games etc. In these applications, end-to-end communication is suitable to reduce transmission delay and achieve efficient network usage. Also, IP mobility and security are important matters. However, the conventional IP mobility mechanisms are not suitable for these applications because most mechanisms are assumed to be installed in OS kernel. We have developed a novel IP mobility mechanism called NTMobile (Network Traversal with Mobility). NTMobile supports end-to-end IP mobility in IPv4 and IPv6 networks, however, it is assumed to be installed in Linux kernel as with other technologies. In this paper, we propose a new type of end-to-end mobility platform that provides end-to-end communication, mobility, and also secure data exchange functions in the application layer for smartphone applications. In the platform, we use NTMobile, which is ported as the application program. Then, we extend NTMobile to be suitable for smartphone devices and to provide secure data exchange. Client applications can achieve secure end-to-end communication and secure data exchange by sharing an encryption key between clients. Users also enjoy IP mobility which is the main function of NTMobile in each application. Finally, we confirmed that the developed module can work on Android system and iOS system.
智能手机是一种新型的移动设备,用户可以轻松地安装额外的移动软件。在几乎所有的智能手机应用程序中,都使用客户机-服务器模型,因为NAT路由器阻止了端到端通信。最近,一些智能手机应用程序提供实时服务,如语音和视频通信,在线游戏等。在这些应用中,端到端通信是减少传输延迟和实现网络高效利用的理想方式。此外,IP移动性和安全性也很重要。然而,传统的IP迁移机制并不适合这些应用程序,因为大多数机制都假定安装在操作系统内核中。我们开发了一种新的IP移动机制,称为NTMobile (Network Traversal with mobility)。NTMobile支持IPv4和IPv6网络的端到端IP迁移,但与其他技术一样,假定安装在Linux内核中。在本文中,我们提出了一种新型的端到端移动平台,为智能手机应用提供端到端的通信、移动性和应用层的安全数据交换功能。在该平台中,我们使用了NTMobile作为应用程序移植。然后,我们扩展NTMobile,使其适合智能手机设备,并提供安全的数据交换。客户机应用程序可以通过在客户机之间共享加密密钥来实现安全的端到端通信和安全的数据交换。用户还可以享受IP移动,这是NTMobile在每个应用程序中的主要功能。最后,我们验证了所开发的模块可以在Android系统和iOS系统上运行。
{"title":"End-to-end IP mobility platform in application layer for iOS and Android OS","authors":"K. Naito, K. Mori, Hideo Kobayashi, Kazuma Kamienoo, Hidekazu Suzuki, A. Watanabe","doi":"10.1109/CCNC.2014.6866554","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6866554","url":null,"abstract":"Smartphones are a new type of mobile devices that users can install additional mobile software easily. In the almost all smartphone applications, client-server model is used because end-to-end communication is prevented by NAT routers. Recently, some smartphone applications provide real time services such as voice and video communication, online games etc. In these applications, end-to-end communication is suitable to reduce transmission delay and achieve efficient network usage. Also, IP mobility and security are important matters. However, the conventional IP mobility mechanisms are not suitable for these applications because most mechanisms are assumed to be installed in OS kernel. We have developed a novel IP mobility mechanism called NTMobile (Network Traversal with Mobility). NTMobile supports end-to-end IP mobility in IPv4 and IPv6 networks, however, it is assumed to be installed in Linux kernel as with other technologies. In this paper, we propose a new type of end-to-end mobility platform that provides end-to-end communication, mobility, and also secure data exchange functions in the application layer for smartphone applications. In the platform, we use NTMobile, which is ported as the application program. Then, we extend NTMobile to be suitable for smartphone devices and to provide secure data exchange. Client applications can achieve secure end-to-end communication and secure data exchange by sharing an encryption key between clients. Users also enjoy IP mobility which is the main function of NTMobile in each application. Finally, we confirmed that the developed module can work on Android system and iOS system.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126694362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-28DOI: 10.1109/CCNC.2014.6866602
Chunchao Liang, Sunho Lim, Manki Min, Wei Wang
For scalable information routing and dissemination, broadcast has been gaining tremendous interests of research in Wireless Sensor Networks (WSNs), where each sensor node has inherent resource constraints in terms of battery energy, and computing and communication capabilities. Since a blind broadcast can cause the broadcast storm problem, diverse broadcast strategies have been explored to increase the network coverage but to minimize the redundant rebroadcasts. In this paper, we propose a geometric broadcast scheme in dense WSNs. This scheme deploys a sender-initiated broadcast approach, where a sender approximates the location of its neighbor nodes without using an on-board global positioning system (GPS). Then the sender selects a set of forwarding candidate nodes located at the closest to the strategic positions based on a virtual hexagon-based coverage. A simple random backoff mechanism is also proposed to reduce the packet contentions and collisions. We develop a customized discrete-event driven simulator using the OMNeT++ to conduct our experiments. Two well-known broadcast schemes are modified to work in dense WSNs: Flooding and Ad Hoc Broadcast Protocol (AHBP). We conduct an extensive performance comparison study and the proposed scheme achieves a competitive and scalable performance in dense WSNs.
{"title":"Geometric broadcast without GPS support in dense wireless sensor networks","authors":"Chunchao Liang, Sunho Lim, Manki Min, Wei Wang","doi":"10.1109/CCNC.2014.6866602","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6866602","url":null,"abstract":"For scalable information routing and dissemination, broadcast has been gaining tremendous interests of research in Wireless Sensor Networks (WSNs), where each sensor node has inherent resource constraints in terms of battery energy, and computing and communication capabilities. Since a blind broadcast can cause the broadcast storm problem, diverse broadcast strategies have been explored to increase the network coverage but to minimize the redundant rebroadcasts. In this paper, we propose a geometric broadcast scheme in dense WSNs. This scheme deploys a sender-initiated broadcast approach, where a sender approximates the location of its neighbor nodes without using an on-board global positioning system (GPS). Then the sender selects a set of forwarding candidate nodes located at the closest to the strategic positions based on a virtual hexagon-based coverage. A simple random backoff mechanism is also proposed to reduce the packet contentions and collisions. We develop a customized discrete-event driven simulator using the OMNeT++ to conduct our experiments. Two well-known broadcast schemes are modified to work in dense WSNs: Flooding and Ad Hoc Broadcast Protocol (AHBP). We conduct an extensive performance comparison study and the proposed scheme achieves a competitive and scalable performance in dense WSNs.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116940461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}