首页 > 最新文献

2016 International Conference on Computing, Networking and Communications (ICNC)最新文献

英文 中文
Mobility assisted device-to-device communications underlaying cellular networks 移动性辅助了蜂窝网络底层的设备对设备通信
Pub Date : 2016-03-24 DOI: 10.1109/ICCNC.2016.7440571
Chuhan Gao, Yong Li, Depeng Jin
With the explosive growth of mobile data demands for local services, device-to-device (D2D) communication is proposed as a vital technology for next generation cellular network to enhance the transmission capacity. With the popularity of content-based mobile applications, popular content downloading can be optimized by allowing D2D communications to share the content with each other. Such improvements depend on effective and efficient solutions for the D2D technical problems of mode selection and resource allocation. Existing works dealing with these technical problems usually stand in the viewpoint of some network snapshots with fixed topology of static mobile users to optimization the instantaneous resource utilization. In this paper, from an angle of dynamic networks, we consider the mode selection and resource allocation problems for D2D communication underlaying cellular network with opportunistic change of users' location by fully exploiting their mobility patterns to achieve global optimization. By formulating the above process-oriented optimization problems, we introduce a utility function and contention graph based approaches, termed MAD2D (Mobility assisted D2D), to heuristically solve them effectively. Through extensive simulations, we demonstrate MAD2D greatly enhanced the system performance compared with the state-of-the-art solutions.
随着本地业务对移动数据需求的爆炸式增长,设备到设备(device-to-device, D2D)通信被提出作为下一代蜂窝网络增强传输能力的一项重要技术。随着基于内容的移动应用程序的普及,可以通过允许D2D通信彼此共享内容来优化流行内容的下载。这种改进依赖于D2D模式选择和资源分配等技术问题的有效和高效的解决方案。处理这些技术问题的现有工作通常站在静态移动用户具有固定拓扑的一些网络快照的角度,以优化瞬时资源利用率。本文从动态网络的角度出发,通过充分利用移动用户的移动模式实现全局优化,研究了基于蜂窝网络的D2D通信在用户位置机会性变化情况下的模式选择和资源分配问题。通过阐述上述面向过程的优化问题,我们引入了一种基于效用函数和争用图的方法,称为MAD2D(移动性辅助D2D),以启发式有效地解决这些问题。通过大量的仿真,我们证明MAD2D与最先进的解决方案相比大大提高了系统性能。
{"title":"Mobility assisted device-to-device communications underlaying cellular networks","authors":"Chuhan Gao, Yong Li, Depeng Jin","doi":"10.1109/ICCNC.2016.7440571","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440571","url":null,"abstract":"With the explosive growth of mobile data demands for local services, device-to-device (D2D) communication is proposed as a vital technology for next generation cellular network to enhance the transmission capacity. With the popularity of content-based mobile applications, popular content downloading can be optimized by allowing D2D communications to share the content with each other. Such improvements depend on effective and efficient solutions for the D2D technical problems of mode selection and resource allocation. Existing works dealing with these technical problems usually stand in the viewpoint of some network snapshots with fixed topology of static mobile users to optimization the instantaneous resource utilization. In this paper, from an angle of dynamic networks, we consider the mode selection and resource allocation problems for D2D communication underlaying cellular network with opportunistic change of users' location by fully exploiting their mobility patterns to achieve global optimization. By formulating the above process-oriented optimization problems, we introduce a utility function and contention graph based approaches, termed MAD2D (Mobility assisted D2D), to heuristically solve them effectively. Through extensive simulations, we demonstrate MAD2D greatly enhanced the system performance compared with the state-of-the-art solutions.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129831733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Two for the price of one: A combined browser defense against XSS and clickjacking 一物换二物:一种针对XSS和点击劫持的联合浏览器防御
Pub Date : 2016-03-24 DOI: 10.1109/ICCNC.2016.7440629
K. S. Rao, N. Jain, Nikhil Limaje, Abhilash Gupta, Mridul Jain, B. Menezes
Cross Site Scripting (XSS) and clickjacking have been ranked among the top web application threats in recent times. This paper introduces XBuster - our client-side defence against XSS, implemented as an extension to the Mozilla Firefox browser. XBuster splits each HTTP request parameter into HTML and JavaScript contexts and stores them separately. It searches for both contexts in the HTTP response and handles each context type differently. It defends against all XSS attack vectors including partial script injection, attribute injection and HTML injection. Also, existing XSS filters may inadvertently disable frame busting code used in web pages as a defence against clickjacking. However, XBuster has been designed to detect and neutralize such attempts.
最近,跨站脚本(XSS)和点击劫持已经成为web应用程序的主要威胁之一。本文介绍了XBuster——我们针对XSS的客户端防御,作为Mozilla Firefox浏览器的扩展实现。XBuster将每个HTTP请求参数拆分为HTML和JavaScript上下文,并分别存储它们。它在HTTP响应中搜索这两种上下文,并以不同的方式处理每种上下文类型。它可以防御所有的XSS攻击向量,包括部分脚本注入、属性注入和HTML注入。此外,现有的XSS过滤器可能会无意中禁用网页中用于防御点击劫持的帧破坏代码。然而,XBuster的设计是为了检测和消除这种企图。
{"title":"Two for the price of one: A combined browser defense against XSS and clickjacking","authors":"K. S. Rao, N. Jain, Nikhil Limaje, Abhilash Gupta, Mridul Jain, B. Menezes","doi":"10.1109/ICCNC.2016.7440629","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440629","url":null,"abstract":"Cross Site Scripting (XSS) and clickjacking have been ranked among the top web application threats in recent times. This paper introduces XBuster - our client-side defence against XSS, implemented as an extension to the Mozilla Firefox browser. XBuster splits each HTTP request parameter into HTML and JavaScript contexts and stores them separately. It searches for both contexts in the HTTP response and handles each context type differently. It defends against all XSS attack vectors including partial script injection, attribute injection and HTML injection. Also, existing XSS filters may inadvertently disable frame busting code used in web pages as a defence against clickjacking. However, XBuster has been designed to detect and neutralize such attempts.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131936510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Investigating the security and digital forensics of video games and gaming systems: A study of PC games and PS4 console 调查视频游戏和游戏系统的安全性和数字取证:PC游戏和PS4主机的研究
Pub Date : 2016-03-24 DOI: 10.1109/ICCNC.2016.7440557
Lei Chen, N. Shashidhar, D. Rawat, Ming Yang, Christopher Kadlec
As video games received rapidly increasing attention, modern video games are often concerned with security and privacy issues. Many such video games and game console systems graciously allow player customization, giving people with malicious intent a new vector to lunch security attacks and exchange secretive messages, which posts new challenges to the society of security and digital forensics. In this research, we investigate the security of four popular PC video games and the Sony PlayStation 4 (PS4) game console. Our study showed that each of these video games has at least one feature that may possibly be exploited by attackers for transmitting secretive information, which is very difficult to be detected using current forensic tools. As for gaming consoles, the hard drive of PS4 console is encrypted and consequently most part of its file system cannot be analyzed using current forensic tools such as AccessData's Forensic Toolkit (FTK). However, it is still possible to lunch Denial of Service (DoS) and ARP cache poisoning attacks to the console, which may slow down and halt the system and potentially expose security sensitive information. Based on the above findings, we offer recommendations on how and where security professionals and digital investigators may search for hidden data.
随着电子游戏受到越来越多的关注,现代电子游戏经常涉及安全和隐私问题。许多这样的视频游戏和游戏机系统都允许玩家自定义,给恶意的人提供了新的载体来进行安全攻击和交换秘密信息,这给安全和数字取证社会带来了新的挑战。在本研究中,我们调查了四种流行的PC视频游戏和索尼PlayStation 4 (PS4)游戏机的安全性。我们的研究表明,这些电子游戏中至少有一个功能可能被攻击者利用来传输秘密信息,而使用当前的取证工具很难检测到这一点。至于游戏主机,PS4主机的硬盘驱动器是加密的,因此其大部分文件系统无法使用AccessData的forensic Toolkit (FTK)等现有取证工具进行分析。但是,仍然有可能将拒绝服务(DoS)和ARP缓存中毒攻击午餐到控制台,这可能会减慢和停止系统,并可能暴露安全敏感信息。基于上述发现,我们就安全专业人员和数字调查人员如何以及在何处搜索隐藏数据提供了建议。
{"title":"Investigating the security and digital forensics of video games and gaming systems: A study of PC games and PS4 console","authors":"Lei Chen, N. Shashidhar, D. Rawat, Ming Yang, Christopher Kadlec","doi":"10.1109/ICCNC.2016.7440557","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440557","url":null,"abstract":"As video games received rapidly increasing attention, modern video games are often concerned with security and privacy issues. Many such video games and game console systems graciously allow player customization, giving people with malicious intent a new vector to lunch security attacks and exchange secretive messages, which posts new challenges to the society of security and digital forensics. In this research, we investigate the security of four popular PC video games and the Sony PlayStation 4 (PS4) game console. Our study showed that each of these video games has at least one feature that may possibly be exploited by attackers for transmitting secretive information, which is very difficult to be detected using current forensic tools. As for gaming consoles, the hard drive of PS4 console is encrypted and consequently most part of its file system cannot be analyzed using current forensic tools such as AccessData's Forensic Toolkit (FTK). However, it is still possible to lunch Denial of Service (DoS) and ARP cache poisoning attacks to the console, which may slow down and halt the system and potentially expose security sensitive information. Based on the above findings, we offer recommendations on how and where security professionals and digital investigators may search for hidden data.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123277897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Effect on vehicle safety of nonexistent or silenced basic safety messages 不存在或沉默的基本安全信息对车辆安全的影响
Pub Date : 2016-03-24 DOI: 10.1109/ICCNC.2016.7440550
George P. Corser, A. Arenas, Huirong Fu
In future vehicular ad-hoc networks (VANETs), Basic Safety Messages (BSMs) would be transmitted by all vehicles every 100ms in order to help prevent inter-vehicle crashes. At first not all vehicles would contain the hardware and software necessary to transmit BSMs; there would be an interval when only a percentage of vehicles would transmit. Further, even after all vehicles install the equipment, some privacy researchers recommend silent periods, spans of time during which vehicles deliberately cease transmissions. This is because BSMs may expose vehicle locations to wireless surveillance, and silent periods could thwart eavesdroppers. Whether due to lack of equipment or due to privacy protocols, silent periods would defeat safety provided by BSMs. This paper quantifies this tradeoff, presenting the Safety-Silence Tradeoff Equation, and showing an inverse exponential relationship between the proportion of vehicles transmitting BSMs and the proportion of potential collisions between vehicles unprotected by BSMs.
在未来的车辆自组织网络(VANETs)中,所有车辆将每100毫秒传输一次基本安全信息(BSMs),以帮助防止车辆之间的碰撞。起初,并非所有车辆都具备传输BSMs所需的硬件和软件;会有一个间隔,只有一定比例的车辆会发射。此外,即使在所有车辆都安装了该设备之后,一些隐私研究人员建议设置静默期,即车辆故意停止传输的一段时间。这是因为BSMs可能会将车辆位置暴露在无线监控之下,而静默期可以阻止窃听者。无论是由于缺乏设备还是由于隐私协议,静默期将破坏bsm提供的安全性。本文量化了这种权衡,提出了安全-安静权衡方程,并展示了传输bsm的车辆比例与未受bsm保护的车辆之间潜在碰撞比例之间的反指数关系。
{"title":"Effect on vehicle safety of nonexistent or silenced basic safety messages","authors":"George P. Corser, A. Arenas, Huirong Fu","doi":"10.1109/ICCNC.2016.7440550","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440550","url":null,"abstract":"In future vehicular ad-hoc networks (VANETs), Basic Safety Messages (BSMs) would be transmitted by all vehicles every 100ms in order to help prevent inter-vehicle crashes. At first not all vehicles would contain the hardware and software necessary to transmit BSMs; there would be an interval when only a percentage of vehicles would transmit. Further, even after all vehicles install the equipment, some privacy researchers recommend silent periods, spans of time during which vehicles deliberately cease transmissions. This is because BSMs may expose vehicle locations to wireless surveillance, and silent periods could thwart eavesdroppers. Whether due to lack of equipment or due to privacy protocols, silent periods would defeat safety provided by BSMs. This paper quantifies this tradeoff, presenting the Safety-Silence Tradeoff Equation, and showing an inverse exponential relationship between the proportion of vehicles transmitting BSMs and the proportion of potential collisions between vehicles unprotected by BSMs.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128155623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Hierarchical traffic engineering based on model predictive control 基于模型预测控制的分层流量工程
Pub Date : 2016-03-24 DOI: 10.1109/ICCNC.2016.7440641
Tatsuya Otoshi, Y. Ohsita, M. Murata, Yousuke Takahashi, K. Ishibashi, K. Shiomoto, T. Hashimoto
Traffic engineering (TE) plays an essential role in deciding routes that effectively use network resources. Since managing the routes of a large network takes a large overhead, multiple controllers are introduced in the network which hierarchically decide the routes. We call this approach hierarchical TE. In hierarchical TE, avoiding the route oscillation is a main problem since routes change at a layer causes the additional routes changes at other layers. The existing hierarchical TE avoids these route oscillation by setting the longer control interval on the upper layer. This approach, however, causes another problem that the routes change of upper layer delays to traffic changes. In this paper, we propose a hierarchical TE method called hierarchical model predictive traffic engineering (hierarchical MP-TE) which avoids routing oscillation without setting the long control interval. In hierarchical MP-TE, each control server gradually changes the routes based on the traffic prediction to stabilize the routing instead of setting the long control interval. Through the simulation, we show that the hierarchical MP-TE achieves the routing convergence with the short control interval.
流量工程(Traffic engineering, TE)在确定路由以有效利用网络资源方面起着至关重要的作用。由于管理大型网络的路由开销较大,因此在网络中引入了多个控制器,这些控制器分层次地决定路由。我们称这种方法为分层TE。在分层TE中,避免路由振荡是一个主要问题,因为一层路由的变化会引起其他层额外的路由变化。现有的分层TE通过在上层设置较长的控制间隔来避免这些路由振荡。但是,这种方法也带来了另一个问题,即上层路由的变化会延迟到流量的变化。本文提出了一种分层模型预测流量工程(hierarchical MP-TE)方法,该方法在不设置较长的控制间隔的情况下避免了路由振荡。在分层MP-TE中,每个控制服务器都根据流量预测逐渐改变路由,以稳定路由,而不是设置较长的控制时间间隔。仿真结果表明,分层MP-TE以较短的控制间隔实现了路由收敛。
{"title":"Hierarchical traffic engineering based on model predictive control","authors":"Tatsuya Otoshi, Y. Ohsita, M. Murata, Yousuke Takahashi, K. Ishibashi, K. Shiomoto, T. Hashimoto","doi":"10.1109/ICCNC.2016.7440641","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440641","url":null,"abstract":"Traffic engineering (TE) plays an essential role in deciding routes that effectively use network resources. Since managing the routes of a large network takes a large overhead, multiple controllers are introduced in the network which hierarchically decide the routes. We call this approach hierarchical TE. In hierarchical TE, avoiding the route oscillation is a main problem since routes change at a layer causes the additional routes changes at other layers. The existing hierarchical TE avoids these route oscillation by setting the longer control interval on the upper layer. This approach, however, causes another problem that the routes change of upper layer delays to traffic changes. In this paper, we propose a hierarchical TE method called hierarchical model predictive traffic engineering (hierarchical MP-TE) which avoids routing oscillation without setting the long control interval. In hierarchical MP-TE, each control server gradually changes the routes based on the traffic prediction to stabilize the routing instead of setting the long control interval. Through the simulation, we show that the hierarchical MP-TE achieves the routing convergence with the short control interval.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116349946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On mobile sensor data collection using data mules 利用数据骡子对移动传感器进行数据采集
Pub Date : 2016-03-24 DOI: 10.1109/ICCNC.2016.7440562
Arun Das, Anisha Mazumder, Arunabha Sen, N. Mitton
The sensor data collection problem using data mules has been studied fairly extensively in the literature. However, in most of these studies, while the mule is mobile, all sensors are stationary. The objective of most of these studies is to minimize the time needed by the mule to collect data from all the sensors and return to the data collection point from where it embarked on its data collection journey. The problem studied in this paper has two major differences with these earlier studies. First, in this study we assume that both the mule as well as the sensors are mobile. Second, we do not attempt to minimize the data collection time. Instead, we minimize the number of mules that will be needed to collect data from all the sensors, subject to the constraint that the data collection process has to be completed within some pre-specified time. We show that the mule minimization problem is NP-Complete and analyze the problem in two settings. We provide solutions to the problem in both settings by first transforming the problem to a generalized version of the minimum flow problem in a network, and then solving it optimally using Integer Linear Programming. Finally, we evaluate our algorithms through experiments and present our results.
使用数据骡子的传感器数据收集问题已经在文献中得到了相当广泛的研究。然而,在大多数这些研究中,当骡子移动时,所有传感器都是静止的。大多数这些研究的目标是最大限度地减少骡子从所有传感器收集数据并从开始收集数据的地方返回数据采集点所需的时间。本文研究的问题与早期的研究有两个主要的不同之处。首先,在本研究中,我们假设骡子和传感器都是可移动的。其次,我们不试图最小化数据收集时间。相反,我们最大限度地减少了从所有传感器收集数据所需的骡子数量,并遵守数据收集过程必须在某些预先指定的时间内完成的约束。证明了骡子最小化问题是np完全的,并在两种情况下对问题进行了分析。我们首先将问题转化为网络中最小流量问题的广义版本,然后使用整数线性规划对其进行最优求解,从而为这两种情况下的问题提供了解决方案。最后,我们通过实验来评估我们的算法并给出我们的结果。
{"title":"On mobile sensor data collection using data mules","authors":"Arun Das, Anisha Mazumder, Arunabha Sen, N. Mitton","doi":"10.1109/ICCNC.2016.7440562","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440562","url":null,"abstract":"The sensor data collection problem using data mules has been studied fairly extensively in the literature. However, in most of these studies, while the mule is mobile, all sensors are stationary. The objective of most of these studies is to minimize the time needed by the mule to collect data from all the sensors and return to the data collection point from where it embarked on its data collection journey. The problem studied in this paper has two major differences with these earlier studies. First, in this study we assume that both the mule as well as the sensors are mobile. Second, we do not attempt to minimize the data collection time. Instead, we minimize the number of mules that will be needed to collect data from all the sensors, subject to the constraint that the data collection process has to be completed within some pre-specified time. We show that the mule minimization problem is NP-Complete and analyze the problem in two settings. We provide solutions to the problem in both settings by first transforming the problem to a generalized version of the minimum flow problem in a network, and then solving it optimally using Integer Linear Programming. Finally, we evaluate our algorithms through experiments and present our results.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125639458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Ethernet signal transmission via VLC lighting LED link in a real network 以太网信号的传输通过VLC照明LED链路在真实网络中进行
Pub Date : 2016-03-24 DOI: 10.1109/ICCNC.2016.7440615
Piotr Zwierko, L. Maksymiuk, J. Siuzdak
The paper presents a two way open space optical link ready for 10/100 Mbit/s Ethernet signal transmission. It uses lighting LEDs as light sources in both transmission directions. A description of used circuitry is given together with experimental results obtained in a real network.
提出了一种用于10/ 100mbit /s以太网信号传输的双向开放空间光链路。它在两个传输方向上都使用照明led作为光源。给出了所用电路的描述,并给出了在实际网络中的实验结果。
{"title":"Ethernet signal transmission via VLC lighting LED link in a real network","authors":"Piotr Zwierko, L. Maksymiuk, J. Siuzdak","doi":"10.1109/ICCNC.2016.7440615","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440615","url":null,"abstract":"The paper presents a two way open space optical link ready for 10/100 Mbit/s Ethernet signal transmission. It uses lighting LEDs as light sources in both transmission directions. A description of used circuitry is given together with experimental results obtained in a real network.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124313679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimal energy harvest-based weighed cooperative spectrum sensing in cognitive radio 基于最优能量收获的认知无线电加权协同频谱感知
Pub Date : 2016-03-24 DOI: 10.1109/ICCNC.2016.7440554
Xin Liu, Junhua Yan, Kunqi Chen
In order to improve sensing performance to primary user (PU) and decrease energy wastage of secondary user (SU) in cognitive radio (CR), an energy harvest-based weighed cooperative spectrum sensing is proposed in this paper. The SU harvests the radio frequency (RF) energy of the PU signal, which is then converted into the electric energy to supply the power used for sensing and cooperation. A joint optimization problem is formulated to maximize the spectrum access probability of the SU by jointly optimizing sensing time and number of cooperative SUs. The simulation results have shown that compared to the traditional cooperative sensing, the proposed cooperative sensing can decrease the energy wastage obviously, and there deed exists an optimal set of sensing time and SU number that maximizes the spectrum access probability.
为了提高认知无线电(CR)中对主用户(PU)的感知性能,减少次用户(SU)的能量浪费,提出了一种基于能量收获的加权协同频谱感知方法。SU收集PU信号的射频(RF)能量,然后将其转换为电能,为传感和合作提供电力。通过联合优化感知时间和合作单元的数量,构造了一个联合优化问题,以使单个单元的频谱接入概率最大化。仿真结果表明,与传统的协同感知相比,所提出的协同感知能明显减少能量的浪费,并且确实存在使频谱接入概率最大化的最优感知时间和SU数集合。
{"title":"Optimal energy harvest-based weighed cooperative spectrum sensing in cognitive radio","authors":"Xin Liu, Junhua Yan, Kunqi Chen","doi":"10.1109/ICCNC.2016.7440554","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440554","url":null,"abstract":"In order to improve sensing performance to primary user (PU) and decrease energy wastage of secondary user (SU) in cognitive radio (CR), an energy harvest-based weighed cooperative spectrum sensing is proposed in this paper. The SU harvests the radio frequency (RF) energy of the PU signal, which is then converted into the electric energy to supply the power used for sensing and cooperation. A joint optimization problem is formulated to maximize the spectrum access probability of the SU by jointly optimizing sensing time and number of cooperative SUs. The simulation results have shown that compared to the traditional cooperative sensing, the proposed cooperative sensing can decrease the energy wastage obviously, and there deed exists an optimal set of sensing time and SU number that maximizes the spectrum access probability.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122495264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
CTP-WUR: The collection tree protocol in wake-up radio WSNs for critical applications CTP-WUR:用于关键应用的唤醒无线wsn中的收集树协议
Pub Date : 2016-03-24 DOI: 10.1109/ICCNC.2016.7440687
S. Basagni, C. Petrioli, Dora Spenza
Allowing the nodes of a wireless sensor network (WSN) to turn their radio off periodically noticeably increases network lifetime. Duty cycling, however, does not eliminate idle listening, comes at the price of longer latencies and obtains lifetimes that are still insufficient for many critical applications. Using a wake-up receiver (WUR) allows actual communications on the main radio only for transmission or reception, virtually eliminating node idling. However, the range of current WUR prototypes is still significantly shorter than that of the main radio, which can challenge the use of existing WSN protocols in WUR-based networks. In this paper we present an approach to mitigate this limitation of wake-up-based networks. In particular, we show that the Collection Tree Protocol (CTP), a standard protocol for data gathering in WSNs, suitably redefined to work on WUR-endowed nodes, achieves lifetimes of several decades. This constitutes a remarkable improvement over duty cycle-based solutions, where CTP makes the network lasts only a handful of months. At the same time, our WUR-based approach obtains data latencies comparable to those obtained by keeping the main radio always on.
允许无线传感器网络(WSN)的节点周期性地关闭它们的无线电,可以显著地延长网络寿命。然而,占空比并不能消除空闲侦听,代价是更长的延迟,并且获得的生命周期对于许多关键应用程序来说仍然不够。使用唤醒接收器(WUR)允许主无线电上的实际通信仅用于传输或接收,实际上消除了节点空闲。然而,当前WUR原型的范围仍然明显短于主要无线电,这可能会挑战现有WSN协议在基于WUR的网络中的使用。在本文中,我们提出了一种方法来减轻基于唤醒的网络的这种限制。特别地,我们展示了收集树协议(CTP),一个用于wsn数据收集的标准协议,适当地重新定义以在wur赋予的节点上工作,实现了几十年的生命周期。与基于占空比的解决方案相比,这是一个显著的改进,在占空比中,CTP使网络仅持续几个月。同时,我们基于wur的方法获得的数据延迟与保持主无线电始终打开所获得的数据延迟相当。
{"title":"CTP-WUR: The collection tree protocol in wake-up radio WSNs for critical applications","authors":"S. Basagni, C. Petrioli, Dora Spenza","doi":"10.1109/ICCNC.2016.7440687","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440687","url":null,"abstract":"Allowing the nodes of a wireless sensor network (WSN) to turn their radio off periodically noticeably increases network lifetime. Duty cycling, however, does not eliminate idle listening, comes at the price of longer latencies and obtains lifetimes that are still insufficient for many critical applications. Using a wake-up receiver (WUR) allows actual communications on the main radio only for transmission or reception, virtually eliminating node idling. However, the range of current WUR prototypes is still significantly shorter than that of the main radio, which can challenge the use of existing WSN protocols in WUR-based networks. In this paper we present an approach to mitigate this limitation of wake-up-based networks. In particular, we show that the Collection Tree Protocol (CTP), a standard protocol for data gathering in WSNs, suitably redefined to work on WUR-endowed nodes, achieves lifetimes of several decades. This constitutes a remarkable improvement over duty cycle-based solutions, where CTP makes the network lasts only a handful of months. At the same time, our WUR-based approach obtains data latencies comparable to those obtained by keeping the main radio always on.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125340019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Performance evaluation of alternative routing in a wireless mesh network with an adaptive array 自适应阵列无线网状网络中备选路由的性能评价
Pub Date : 2016-03-24 DOI: 10.1109/ICCNC.2016.7440601
Kosuke Suzuki, T. Nishimura, T. Ohgane, Y. Ogawa
In a wireless mesh network (WMN), the interference from active links in the vicinity of the node of interest is frequently not negligible and thus degrades the area spectral efficiency. An adaptive array is capable to control not only beams but also nulls. Thus, it is expected to help new link establishment. Moreover, the alternative routing boosts such spatial link multiplexing by decreasing the nodes in the stand-by state. In the paper, we evaluate the system throughput performance of the alternative routing in a WMN with an adaptive array of three elements. The evaluation results show that the alternative routing is very effective in the case of a gateway access model or when the average hop counts in the network is not so small.
在无线网状网络(WMN)中,来自感兴趣节点附近的活动链路的干扰往往是不可忽略的,从而降低了区域频谱效率。自适应阵列不仅能控制波束,还能控制空区。因此,它有望帮助建立新的联系。此外,备选路由通过减少处于待机状态的节点来促进这种空间链路复用。在本文中,我们评估了具有三元自适应阵列的WMN备选路由的系统吞吐量性能。评估结果表明,在网关接入模型或网络中平均跳数不是很小的情况下,备选路由是非常有效的。
{"title":"Performance evaluation of alternative routing in a wireless mesh network with an adaptive array","authors":"Kosuke Suzuki, T. Nishimura, T. Ohgane, Y. Ogawa","doi":"10.1109/ICCNC.2016.7440601","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440601","url":null,"abstract":"In a wireless mesh network (WMN), the interference from active links in the vicinity of the node of interest is frequently not negligible and thus degrades the area spectral efficiency. An adaptive array is capable to control not only beams but also nulls. Thus, it is expected to help new link establishment. Moreover, the alternative routing boosts such spatial link multiplexing by decreasing the nodes in the stand-by state. In the paper, we evaluate the system throughput performance of the alternative routing in a WMN with an adaptive array of three elements. The evaluation results show that the alternative routing is very effective in the case of a gateway access model or when the average hop counts in the network is not so small.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127978741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2016 International Conference on Computing, Networking and Communications (ICNC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1