首页 > 最新文献

Third International Conference on Communications and Networking最新文献

英文 中文
Matching Pursuit versus threshold-based approach for channel estimation in OFDM systems OFDM系统中信道估计的匹配跟踪与基于阈值的方法
Pub Date : 2012-06-14 DOI: 10.1109/ComNet.2012.6217738
Zakia Jellali, L. N. Atallah
Channels exhibiting a sparse impulse response arise in a number of communication applications. In this paper, we address the problem of sparse channel estimation in Orthogonal Frequency Division Multiplexing (OFDM) systems. Our goal is to compare the accuracy of the Matching Pursuit (MP) [1] approach to an optimized threshold-based approach, named the Probabilistic Framework Estimator (PFE) [2]. The comparison of the two considered approaches is carried in the two scenarios of a priori and no priori knowledge about the channel degree of sparsity (CDS). To this end, the PFE algorithm is extended to the case of known probability of active taps. Also, an adapted version of the MP, to the case of unknown number of paths, is proposed.
显示稀疏脉冲响应的信道出现在许多通信应用中。本文主要研究正交频分复用(OFDM)系统中的稀疏信道估计问题。我们的目标是比较匹配追踪(MP)[1]方法与基于优化阈值的方法(称为概率框架估计器(PFE)[2])的准确性。在信道稀疏度(CDS)有先验知识和无先验知识两种情况下,对所考虑的两种方法进行比较。为此,将PFE算法扩展到活动抽头概率已知的情况。此外,本文还针对路径数未知的情况,提出了一种改进的多路径算法。
{"title":"Matching Pursuit versus threshold-based approach for channel estimation in OFDM systems","authors":"Zakia Jellali, L. N. Atallah","doi":"10.1109/ComNet.2012.6217738","DOIUrl":"https://doi.org/10.1109/ComNet.2012.6217738","url":null,"abstract":"Channels exhibiting a sparse impulse response arise in a number of communication applications. In this paper, we address the problem of sparse channel estimation in Orthogonal Frequency Division Multiplexing (OFDM) systems. Our goal is to compare the accuracy of the Matching Pursuit (MP) [1] approach to an optimized threshold-based approach, named the Probabilistic Framework Estimator (PFE) [2]. The comparison of the two considered approaches is carried in the two scenarios of a priori and no priori knowledge about the channel degree of sparsity (CDS). To this end, the PFE algorithm is extended to the case of known probability of active taps. Also, an adapted version of the MP, to the case of unknown number of paths, is proposed.","PeriodicalId":296060,"journal":{"name":"Third International Conference on Communications and Networking","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121602184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation and comparison of resource allocation strategies for new streaming services in wireless cellular networks 无线蜂窝网络中新型流媒体服务资源分配策略的评价与比较
Pub Date : 2012-06-14 DOI: 10.1109/ComNet.2012.6217734
M. Karray, Yasir Khan
Since a long time wireless networks have been offering two types of services: variable bit-rate such as mail and constant bit-rate such as voice. Recently they also offer service for streaming calls such as mobile television. The objective of the present paper is to study the problem of allocating (and sharing) the resources for this new type of calls and to compare the performance of different allocation strategies. The allocation strategy implemented in real networks is an iterative time-sharing strategy. We build an explicit formulation of this strategy which permits not only a faster implementation, but also an analytical evaluation of its performance. Moreover we describe an optimal allocation strategy consisting of assigning the resources in priority to the least consuming ones. A cornerstone to evaluate and compare the different allocation strategies is the so-called outage probability defined for each location as the probability that a user in this location doesn't get his required bit-rate. We compare the efficiency of different numerical methods to calculate it; and show that the inverse Laplace method is rapid and efficient. We also calculate the increase of the outage probability of the time-sharing strategy compared to the optimal one. Finally, we validate a method permitting to calculate analytically the average of the outage probabilities over the different locations.
长期以来,无线网络一直提供两种类型的服务:可变比特率(如邮件)和恒定比特率(如语音)。最近,他们还提供流媒体电话服务,如移动电视。本文的目的是研究这种新型调用的资源分配(和共享)问题,并比较不同分配策略的性能。在实际网络中实现的分配策略是一种迭代的分时策略。我们建立了这一战略的明确公式,它不仅允许更快的实施,而且允许对其性能进行分析性评估。此外,我们还描述了一种将资源优先分配给消耗最少的资源的最优分配策略。评估和比较不同分配策略的基础是所谓的中断概率,它为每个位置定义为该位置的用户未获得所需比特率的概率。比较了不同数值计算方法的效率;证明了拉普拉斯逆变换法的快速和高效。我们还计算了与最优分时策略相比,分时策略的中断概率增加。最后,我们验证了一种方法,该方法允许分析地计算不同位置的停机概率的平均值。
{"title":"Evaluation and comparison of resource allocation strategies for new streaming services in wireless cellular networks","authors":"M. Karray, Yasir Khan","doi":"10.1109/ComNet.2012.6217734","DOIUrl":"https://doi.org/10.1109/ComNet.2012.6217734","url":null,"abstract":"Since a long time wireless networks have been offering two types of services: variable bit-rate such as mail and constant bit-rate such as voice. Recently they also offer service for streaming calls such as mobile television. The objective of the present paper is to study the problem of allocating (and sharing) the resources for this new type of calls and to compare the performance of different allocation strategies. The allocation strategy implemented in real networks is an iterative time-sharing strategy. We build an explicit formulation of this strategy which permits not only a faster implementation, but also an analytical evaluation of its performance. Moreover we describe an optimal allocation strategy consisting of assigning the resources in priority to the least consuming ones. A cornerstone to evaluate and compare the different allocation strategies is the so-called outage probability defined for each location as the probability that a user in this location doesn't get his required bit-rate. We compare the efficiency of different numerical methods to calculate it; and show that the inverse Laplace method is rapid and efficient. We also calculate the increase of the outage probability of the time-sharing strategy compared to the optimal one. Finally, we validate a method permitting to calculate analytically the average of the outage probabilities over the different locations.","PeriodicalId":296060,"journal":{"name":"Third International Conference on Communications and Networking","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125482507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Simulation and performance evaluation of DAG construction with RPL 基于RPL的DAG结构仿真与性能评价
Pub Date : 2012-06-14 DOI: 10.1109/ComNet.2012.6217747
Olfa Gaddour, A. Koubâa, S. A. Chaudhry, M. Tezeghdanti, Rihab Chaâri, M. Abid
In this paper, we simulate and analyze the performance of the network formation process with the RPL (IPv6 Routing Protocol for Low Power and Lossy Networks), which is a routing protocol specifically designed for Low power and Lossy Networks (LLN) compliant with 6LoWPAN (IPv6 Low power Wireless Personal Area Networks). One motivation behind this work is that RPL is the first prospective candidate routing protocol for low-power and lossy networks, which are a main component in the next generation Internet-of-Things. RPL is still under development, although having gained maturity, and is open to improvements. Indeed, there is a need to understand well its behavior, and investigate its relevance. Our analysis is based on the ContikiRPL accurate and realistic simulation model developed under Contiki operating system. The performance of RPL is evaluated and analyzed for different network settings to understand the impact of the protocol attributes on the network formation performance, namely in terms energy, storage overhead, communication overhead, network convergence time and the maximum hop count. We argue through simulation that RPL provides several features that make it suitable to large scale networks.
在本文中,我们使用RPL (IPv6 Routing Protocol for Low Power and Lossy Networks)来模拟和分析网络形成过程的性能,RPL是一种专门为低功耗和有损网络(LLN)设计的路由协议,符合6LoWPAN (IPv6低功耗无线个人区域网络)。这项工作背后的一个动机是,RPL是低功耗和有损网络的第一个潜在候选路由协议,这是下一代物联网的主要组成部分。RPL虽然已经成熟,但仍在发展中,并且可以改进。的确,有必要很好地理解它的行为,并调查其相关性。我们的分析是基于ContikiRPL在Contiki操作系统下开发的精确逼真的仿真模型。通过对不同网络设置下RPL的性能进行评估和分析,了解协议属性对网络形成性能的影响,即能量、存储开销、通信开销、网络收敛时间和最大跳数。我们通过仿真论证了RPL提供了几个使其适合大规模网络的特性。
{"title":"Simulation and performance evaluation of DAG construction with RPL","authors":"Olfa Gaddour, A. Koubâa, S. A. Chaudhry, M. Tezeghdanti, Rihab Chaâri, M. Abid","doi":"10.1109/ComNet.2012.6217747","DOIUrl":"https://doi.org/10.1109/ComNet.2012.6217747","url":null,"abstract":"In this paper, we simulate and analyze the performance of the network formation process with the RPL (IPv6 Routing Protocol for Low Power and Lossy Networks), which is a routing protocol specifically designed for Low power and Lossy Networks (LLN) compliant with 6LoWPAN (IPv6 Low power Wireless Personal Area Networks). One motivation behind this work is that RPL is the first prospective candidate routing protocol for low-power and lossy networks, which are a main component in the next generation Internet-of-Things. RPL is still under development, although having gained maturity, and is open to improvements. Indeed, there is a need to understand well its behavior, and investigate its relevance. Our analysis is based on the ContikiRPL accurate and realistic simulation model developed under Contiki operating system. The performance of RPL is evaluated and analyzed for different network settings to understand the impact of the protocol attributes on the network formation performance, namely in terms energy, storage overhead, communication overhead, network convergence time and the maximum hop count. We argue through simulation that RPL provides several features that make it suitable to large scale networks.","PeriodicalId":296060,"journal":{"name":"Third International Conference on Communications and Networking","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134320984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 68
Spectrum sensing based on STBC higher order statistics for cognitive radio systems 基于STBC高阶统计量的认知无线电系统频谱感知
Pub Date : 2012-06-14 DOI: 10.1109/ComNet.2012.6217748
Asma Ben Hadj Hmida, S. Cherif, Hichem Besbes
In this paper, we treat the orthogonal space-time block coded signals. Those codes present a redundancy that can be exploited for the enhancement of the detection. We first study the classical energy detector based STBC and prove the benefits of spatial diversity in enhancing the capability of signal detection. Taking advantage of the Alamouti code structure, we propose two statistical metric tests based on high order moments and we evaluate their performances. Simulations results show that the proposed algorithms intend to offer better performance compared to the classical energy detector. Indeed, the first proposed metric test improves the performance in terms of the accuracy of the detection. In fact, the detection probability is improved by almost 18% at 1% false alarm. In the other hand, the second proposed metric offers better performance in terms of robustness to the noise uncertainty, 80% compared to the classical energy detector for an uncertainty level equal to 1 and 2dB.
本文主要研究正交空时分组编码信号。这些代码具有冗余性,可用于增强检测。首先研究了基于STBC的经典能量检测器,证明了空间分集在提高信号检测能力方面的优势。利用Alamouti码结构,提出了两种基于高阶矩的统计度量测试方法,并对其性能进行了评价。仿真结果表明,与传统的能量检测器相比,所提出的算法具有更好的性能。实际上,第一个度量测试在检测的准确性方面提高了性能。事实上,在1%的误报情况下,检测概率提高了近18%。另一方面,第二个提出的度量在噪声不确定性方面提供了更好的性能,在不确定性水平为1和2dB时,与经典能量检测器相比,其鲁棒性提高了80%。
{"title":"Spectrum sensing based on STBC higher order statistics for cognitive radio systems","authors":"Asma Ben Hadj Hmida, S. Cherif, Hichem Besbes","doi":"10.1109/ComNet.2012.6217748","DOIUrl":"https://doi.org/10.1109/ComNet.2012.6217748","url":null,"abstract":"In this paper, we treat the orthogonal space-time block coded signals. Those codes present a redundancy that can be exploited for the enhancement of the detection. We first study the classical energy detector based STBC and prove the benefits of spatial diversity in enhancing the capability of signal detection. Taking advantage of the Alamouti code structure, we propose two statistical metric tests based on high order moments and we evaluate their performances. Simulations results show that the proposed algorithms intend to offer better performance compared to the classical energy detector. Indeed, the first proposed metric test improves the performance in terms of the accuracy of the detection. In fact, the detection probability is improved by almost 18% at 1% false alarm. In the other hand, the second proposed metric offers better performance in terms of robustness to the noise uncertainty, 80% compared to the classical energy detector for an uncertainty level equal to 1 and 2dB.","PeriodicalId":296060,"journal":{"name":"Third International Conference on Communications and Networking","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123447003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Firewall packet matching optimization using network traffic behavior and packet matching statistics 防火墙报文匹配优化使用网络流量行为和报文匹配统计
Pub Date : 2012-06-14 DOI: 10.1109/ComNet.2012.6217735
Z. Trabelsi, Hishem El Sayed, S. Zeidan
In this paper, we present a mechanism that utilizes network traffic behavior and packet matching statistics to optimize dynamically the ordering of the firewall filtering rules. The proposed technique segments the traffic space, calculates the matching rate for each filtering rule and deduces statistics means and variances over a predefined window of segments. The means and variances are used to update the positions of the filtering rules in the security policy. Through experiments using simulated firewall and network traffic generator, the proposed mechanism is shown to be efficient and easy to deploy in practical firewall implementation. This work demonstrates that the use of dynamic rule-ordering improves the filtering processing time and allows firewall administrators to analyze further the network traffic behavior and accordingly adjust the initial order of the filtering rules.
本文提出了一种利用网络流量行为和包匹配统计动态优化防火墙过滤规则排序的机制。该技术对流量空间进行分段,计算每个过滤规则的匹配率,并在预定义的分段窗口内推导统计均值和方差。均值和方差用于更新过滤规则在安全策略中的位置。通过模拟防火墙和网络流量生成器的实验,证明了该机制在实际防火墙实现中是有效且易于部署的。该研究表明,使用动态规则排序可以缩短过滤处理时间,并允许防火墙管理员进一步分析网络流量行为,并相应地调整过滤规则的初始顺序。
{"title":"Firewall packet matching optimization using network traffic behavior and packet matching statistics","authors":"Z. Trabelsi, Hishem El Sayed, S. Zeidan","doi":"10.1109/ComNet.2012.6217735","DOIUrl":"https://doi.org/10.1109/ComNet.2012.6217735","url":null,"abstract":"In this paper, we present a mechanism that utilizes network traffic behavior and packet matching statistics to optimize dynamically the ordering of the firewall filtering rules. The proposed technique segments the traffic space, calculates the matching rate for each filtering rule and deduces statistics means and variances over a predefined window of segments. The means and variances are used to update the positions of the filtering rules in the security policy. Through experiments using simulated firewall and network traffic generator, the proposed mechanism is shown to be efficient and easy to deploy in practical firewall implementation. This work demonstrates that the use of dynamic rule-ordering improves the filtering processing time and allows firewall administrators to analyze further the network traffic behavior and accordingly adjust the initial order of the filtering rules.","PeriodicalId":296060,"journal":{"name":"Third International Conference on Communications and Networking","volume":"32 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114135357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Precoding for MIMO systems with Grassmannian codebooks 用格拉斯曼码本对MIMO系统进行预编码
Pub Date : 2012-06-14 DOI: 10.1109/ComNet.2012.6217744
Imen Turki, I. Kammoun, M. Siala
In this paper, we investigate limited feedback precoding for two single-user MIMO systems. The first one employs spatial diversity at the transmitter and Maximum Ratio Combining at the receiver. The second one uses spatial multiplexing at the transmitter and V-BLAST signal processing at the receiver. For both systems, the precoder is selected at the receiver among a codebook and its index is conveyed to the transmitter through an error free feedback channel. For the first system, we consider two Grassmannian precoding codebooks and show through simulation results that a small number of feedback bits can reach the theoretical performance. For the case of a single-user system based on spatial multiplexing, we propose a novel criterion for selecting among codebook matrices the optimum precoding matrix at the receiver which maximizes the minimum signal to interference and noise ratio over the transmitted substreams. Simulation results show that our proposed selection criterion outperforms three other criteria introduced in the literature for the spatial muliplexing MIMO system. They also show a significant enhancement over the unprecoded spatial multiplexing system.
本文研究了两个单用户MIMO系统的有限反馈预编码。第一种方法在发射端采用空间分集,在接收端采用最大比组合。第二种是在发射器上使用空间复用,在接收器上使用V-BLAST信号处理。对于这两种系统,在接收端从码本中选择预编码器,其索引通过无错误反馈信道传送到发送端。对于第一个系统,我们考虑两个格拉斯曼预编码码本,并通过仿真结果表明,少量反馈比特可以达到理论性能。对于基于空间复用的单用户系统,我们提出了从码本矩阵中选择接收端最优预编码矩阵的新准则,该准则使传输子流的信噪比和干扰比最小。仿真结果表明,我们提出的选择准则优于文献中介绍的空间复用MIMO系统的其他三个标准。与未预编码的空间复用系统相比,它们也显示出显著的增强。
{"title":"Precoding for MIMO systems with Grassmannian codebooks","authors":"Imen Turki, I. Kammoun, M. Siala","doi":"10.1109/ComNet.2012.6217744","DOIUrl":"https://doi.org/10.1109/ComNet.2012.6217744","url":null,"abstract":"In this paper, we investigate limited feedback precoding for two single-user MIMO systems. The first one employs spatial diversity at the transmitter and Maximum Ratio Combining at the receiver. The second one uses spatial multiplexing at the transmitter and V-BLAST signal processing at the receiver. For both systems, the precoder is selected at the receiver among a codebook and its index is conveyed to the transmitter through an error free feedback channel. For the first system, we consider two Grassmannian precoding codebooks and show through simulation results that a small number of feedback bits can reach the theoretical performance. For the case of a single-user system based on spatial multiplexing, we propose a novel criterion for selecting among codebook matrices the optimum precoding matrix at the receiver which maximizes the minimum signal to interference and noise ratio over the transmitted substreams. Simulation results show that our proposed selection criterion outperforms three other criteria introduced in the literature for the spatial muliplexing MIMO system. They also show a significant enhancement over the unprecoded spatial multiplexing system.","PeriodicalId":296060,"journal":{"name":"Third International Conference on Communications and Networking","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124306541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ARQ protocols for MIMO systems MIMO系统的ARQ协议
Pub Date : 2012-06-14 DOI: 10.1109/ComNet.2012.6217727
Fatma Zouaidi, H. Boujemaa, M. Siala
In this paper, we evaluate the performance of Automatic Repeat reQuest (ARQ) protocols for MIMO (Multiple In Multiple Out) Systems using fixed and adaptive Modulation based on the instantaneous Signal to Noise Ratio (SNR). Transmit Antenna Selection (TAS) or/and Space Time Block Coding (STBC) are used. At the receiver, Maximum Ration Combining (MRC), Selection Combining (SC), Generalized SC (GSC), Minimum Selection GSC (MSGSC) and Maximum Likeliood (ML) detection are used. We also propose a combination of TAS and STBC where STBC is performed over two selected best antennas. We provide an analysis of the throughput performance of ARQ for MIMO systems using different transmitting and receiving techniques. Simulation results are also provided to confirm the accuracy of the theoretical analysis.
在本文中,我们评估了多进多出(MIMO)系统中使用基于瞬时信噪比(SNR)的固定和自适应调制的自动重复请求(ARQ)协议的性能。使用发射天线选择(TAS)或/和空时块编码(STBC)。在接收端,使用最大比例组合(MRC)、选择组合(SC)、广义组合(GSC)、最小选择组合(MSGSC)和最大似然(ML)检测。我们还提出了TAS和STBC的组合,其中STBC在两个选定的最佳天线上执行。我们分析了使用不同发射和接收技术的MIMO系统的ARQ吞吐量性能。仿真结果验证了理论分析的准确性。
{"title":"ARQ protocols for MIMO systems","authors":"Fatma Zouaidi, H. Boujemaa, M. Siala","doi":"10.1109/ComNet.2012.6217727","DOIUrl":"https://doi.org/10.1109/ComNet.2012.6217727","url":null,"abstract":"In this paper, we evaluate the performance of Automatic Repeat reQuest (ARQ) protocols for MIMO (Multiple In Multiple Out) Systems using fixed and adaptive Modulation based on the instantaneous Signal to Noise Ratio (SNR). Transmit Antenna Selection (TAS) or/and Space Time Block Coding (STBC) are used. At the receiver, Maximum Ration Combining (MRC), Selection Combining (SC), Generalized SC (GSC), Minimum Selection GSC (MSGSC) and Maximum Likeliood (ML) detection are used. We also propose a combination of TAS and STBC where STBC is performed over two selected best antennas. We provide an analysis of the throughput performance of ARQ for MIMO systems using different transmitting and receiving techniques. Simulation results are also provided to confirm the accuracy of the theoretical analysis.","PeriodicalId":296060,"journal":{"name":"Third International Conference on Communications and Networking","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124361054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure handoff protocol in 3GPP LTE networks 3GPP LTE网络中的安全切换协议
Pub Date : 2012-06-14 DOI: 10.1109/ComNet.2012.6217746
Imen Elbouabidi, Ikbel Daly, F. Zarai
To provide secure 3GPP LTE-WLAN interworking, Extensible Authentication Protocol-Authentication and Key Agreement (EAP-AKA) is used. However, EAP-AKA has several vulnerabilities such as disclosure of user identity, man-in-the-middle attack, Sequence Number (SQN) synchronization, and additional bandwidth consumption. Therefore, in this paper, we propose new re-authentication protocol for wireless 3GPP LTE. The proposed protocol guarantees stronger security, mutual authentication, and resistance against many attacks. The suggested solution proves its effectiveness following the studies of simulation which carried out according to different criteria handoff latency, loss and blocking rate.
为了提供安全的3GPP LTE-WLAN互联,使用了可扩展认证协议-认证和密钥协议(EAP-AKA)。然而,EAP-AKA有几个漏洞,例如用户身份的泄露、中间人攻击、序列号(SQN)同步和额外的带宽消耗。因此,本文提出了一种新的无线3GPP LTE重认证协议。该协议具有更强的安全性、互认证能力和抗多种攻击能力。根据不同的切换延时、丢失和阻塞率进行了仿真研究,证明了该方案的有效性。
{"title":"Secure handoff protocol in 3GPP LTE networks","authors":"Imen Elbouabidi, Ikbel Daly, F. Zarai","doi":"10.1109/ComNet.2012.6217746","DOIUrl":"https://doi.org/10.1109/ComNet.2012.6217746","url":null,"abstract":"To provide secure 3GPP LTE-WLAN interworking, Extensible Authentication Protocol-Authentication and Key Agreement (EAP-AKA) is used. However, EAP-AKA has several vulnerabilities such as disclosure of user identity, man-in-the-middle attack, Sequence Number (SQN) synchronization, and additional bandwidth consumption. Therefore, in this paper, we propose new re-authentication protocol for wireless 3GPP LTE. The proposed protocol guarantees stronger security, mutual authentication, and resistance against many attacks. The suggested solution proves its effectiveness following the studies of simulation which carried out according to different criteria handoff latency, loss and blocking rate.","PeriodicalId":296060,"journal":{"name":"Third International Conference on Communications and Networking","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121580519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Energy efficiency analysis of base station cooperation under limited backhaul capacity 有限回程容量下基站合作的能源效率分析
Pub Date : 2012-06-14 DOI: 10.1109/ComNet.2012.6217733
M. Sarkiss, M. Kamoun
Recently, Energy Efficient (EE) communications have received increasing interest specially in cellular networks. Promising techniques, such as MIMO and Base Station (BS) Cooperation schemes, have been widely studied in the past to improve the spectral efficiency and the reliability. Nowadays, the purpose is to investigate how these techniques can reduce the energy consumption of the systems. In this paper, we address for a single user scenario the energy efficiency of two BSs cooperation under limited backhaul capacity. In order to evaluate the EE metric, we provide an information-theoretical analysis based on the outage probability. Then, we identify by numerical results the cooperation scenarios that can save energy depending on the backhaul capacity.
最近,能源效率(EE)通信受到越来越多的关注,特别是在蜂窝网络中。为了提高频谱效率和可靠性,MIMO和基站(BS)合作方案等技术在过去得到了广泛的研究。目前的目的是研究这些技术如何降低系统的能耗。在本文中,我们讨论了单用户场景下有限回程容量下两个BSs合作的能源效率问题。为了评估EE度量,我们提供了基于中断概率的信息理论分析。在此基础上,通过数值计算确定了基于回程容量的节能合作方案。
{"title":"Energy efficiency analysis of base station cooperation under limited backhaul capacity","authors":"M. Sarkiss, M. Kamoun","doi":"10.1109/ComNet.2012.6217733","DOIUrl":"https://doi.org/10.1109/ComNet.2012.6217733","url":null,"abstract":"Recently, Energy Efficient (EE) communications have received increasing interest specially in cellular networks. Promising techniques, such as MIMO and Base Station (BS) Cooperation schemes, have been widely studied in the past to improve the spectral efficiency and the reliability. Nowadays, the purpose is to investigate how these techniques can reduce the energy consumption of the systems. In this paper, we address for a single user scenario the energy efficiency of two BSs cooperation under limited backhaul capacity. In order to evaluate the EE metric, we provide an information-theoretical analysis based on the outage probability. Then, we identify by numerical results the cooperation scenarios that can save energy depending on the backhaul capacity.","PeriodicalId":296060,"journal":{"name":"Third International Conference on Communications and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125660950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
HIP Tiny Exchange (TEX): A distributed key exchange scheme for HIP-based Internet of Things TEX (HIP Tiny Exchange):一种基于HIP的物联网分布式密钥交换方案
Pub Date : 2012-06-14 DOI: 10.1109/ComNet.2012.6217736
Yosra Ben Saied, Alexis Olivereau
Considering the global identification and security challenges in IoT, the Host Identity Protocol (HIP) emerges as the most suitable solution for key establishment between two peers, allowing secure and uninterrupted connections. However, the heterogeneous nature of IoT entities coupling resource-constrained networks and powerful Internet complicates the use of HIP on small devices due to its expensive cryptographic operations. In this paper we present the HIP Tiny EXchange, a distributed lightweight key exchange protocol designed to reduce the requirements of HIP Basic EXchange in order to be supported by resource-constrained nodes.
考虑到物联网中的全球识别和安全挑战,主机身份协议(Host Identity Protocol, HIP)成为两个对等体之间建立密钥的最合适解决方案,允许安全且不间断的连接。然而,物联网实体的异构特性耦合了资源受限的网络和强大的互联网,由于其昂贵的加密操作,使得在小型设备上使用HIP变得复杂。在本文中,我们提出了一种分布式轻量级密钥交换协议HIP Tiny EXchange,旨在降低HIP Basic EXchange的要求,以便在资源受限的节点上得到支持。
{"title":"HIP Tiny Exchange (TEX): A distributed key exchange scheme for HIP-based Internet of Things","authors":"Yosra Ben Saied, Alexis Olivereau","doi":"10.1109/ComNet.2012.6217736","DOIUrl":"https://doi.org/10.1109/ComNet.2012.6217736","url":null,"abstract":"Considering the global identification and security challenges in IoT, the Host Identity Protocol (HIP) emerges as the most suitable solution for key establishment between two peers, allowing secure and uninterrupted connections. However, the heterogeneous nature of IoT entities coupling resource-constrained networks and powerful Internet complicates the use of HIP on small devices due to its expensive cryptographic operations. In this paper we present the HIP Tiny EXchange, a distributed lightweight key exchange protocol designed to reduce the requirements of HIP Basic EXchange in order to be supported by resource-constrained nodes.","PeriodicalId":296060,"journal":{"name":"Third International Conference on Communications and Networking","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131919653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
期刊
Third International Conference on Communications and Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1