首页 > 最新文献

2009 Wireless Telecommunications Symposium最新文献

英文 中文
Analysis of threshold of regular and irregular LDPC codes using Gaussian approximation 正则和不规则LDPC码的高斯逼近阈值分析
Pub Date : 2009-04-22 DOI: 10.1109/WTS.2009.5068932
C. Ho
We present the formulas for searching for the thresholds of regular and irregular low-density parity-check (LDPC) codes under message-passing (MP) algorithm. A Gaussian approximation is applied to studying the evolution of the means of the messages of the variable nodes and the check nodes. Accurate numerical integration methods by using transformations are shown for evaluating the expected values of the message of the check nodes. Tables are built first and interpolations are used for further evaluations. Two curves are used to locate the threshold. We utilize an iterative decoding tunnel between these two curves and study the decoding performance by evaluating conditions of the derivatives of these two curves. Using this method the performance of both regular and irregular LDPC codes can be studied in a unified manner without using simulation.
给出了在消息传递(MP)算法下正则和不规则低密度奇偶校验(LDPC)码阈值的搜索公式。采用高斯近似方法研究了变量节点和检查节点的消息均值的演化。给出了利用变换计算检查节点消息期望值的精确数值积分方法。首先建立表格,然后使用插值法进行进一步评估。使用两条曲线来定位阈值。我们利用这两条曲线之间的迭代解码隧道,并通过评估这两条曲线的导数条件来研究解码性能。利用该方法可以在不进行仿真的情况下,统一研究规则和不规则LDPC码的性能。
{"title":"Analysis of threshold of regular and irregular LDPC codes using Gaussian approximation","authors":"C. Ho","doi":"10.1109/WTS.2009.5068932","DOIUrl":"https://doi.org/10.1109/WTS.2009.5068932","url":null,"abstract":"We present the formulas for searching for the thresholds of regular and irregular low-density parity-check (LDPC) codes under message-passing (MP) algorithm. A Gaussian approximation is applied to studying the evolution of the means of the messages of the variable nodes and the check nodes. Accurate numerical integration methods by using transformations are shown for evaluating the expected values of the message of the check nodes. Tables are built first and interpolations are used for further evaluations. Two curves are used to locate the threshold. We utilize an iterative decoding tunnel between these two curves and study the decoding performance by evaluating conditions of the derivatives of these two curves. Using this method the performance of both regular and irregular LDPC codes can be studied in a unified manner without using simulation.","PeriodicalId":313087,"journal":{"name":"2009 Wireless Telecommunications Symposium","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114653836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A near-optimal broadcast technique for vehicular networks 一种近乎最优的车载网络广播技术
Pub Date : 2009-04-22 DOI: 10.1109/WTS.2009.5068998
A. H. Ho, Y. H. Ho, K. Hua, Roy Villafane
A vehicular network is a promising application of mobile ad hoc networks. In this paper, we introduce a near-optimal broadcast technique, called CB-S (Cell Broadcast for Streets), for vehicular networks. In this environment, the road network is fragmented into cells such that nodes in a cell can communicate with any node within a two cell distance. Each mobile node is equipped with a GPS (Global Positioning System) unit and a map of the cells. The cell map has information about the cells including their identifier and the coordinates of the upper-right and lower-left corner of each cell. CB-S has the following desirable property. Broadcast of a message is performed by rebroadcasting the message from every other cell in the terrain. This characteristic allows CB-S to achieve near optimal performance. Our simulation results indicate that data can always reach all nodes in the wireless network. This perfect coverage is achieved with minimal overhead. That is, CB-S uses a near optimal (minimum) number of nodes to disseminate the data packets. This optimality gives it the advantage of minimum delay. To show these benefits, we give simulations results to compare CB-S with four other broadcast techniques. In practice, CB-S can be used for information dissemination, or to reduce the high cost of destination discovery in routing protocols. We also present in this paper a CB-SD (Cell Broadcast for Street Dissemination) variant that has all the advantages of CB-S, with the additional benefit of supporting partial broadcast. This scheme is more efficient when broadcast to a subset of the nodes is desirable.
车载网络是移动自组织网络的一个很有前途的应用。在本文中,我们介绍了一种近乎最优的广播技术,称为CB-S(街道小区广播),用于车辆网络。在这种环境中,道路网络被分割成单元,这样一个单元中的节点可以与两个单元距离内的任何节点通信。每个移动节点都配备有GPS(全球定位系统)单元和单元地图。单元格映射包含有关单元格的信息,包括它们的标识符以及每个单元格右上角和左下角的坐标。CB-S具有以下可取的特性。消息的广播是通过从地形上的每个其他单元重新广播消息来执行的。这一特性使CB-S能够达到近乎最佳的性能。我们的仿真结果表明,数据总是能够到达无线网络中的所有节点。这种完美的覆盖是以最小的开销实现的。也就是说,CB-S使用接近最优(最小)数量的节点来传播数据包。这种最优性使其具有最小延迟的优势。为了展示这些优点,我们给出了模拟结果,将CB-S与其他四种广播技术进行了比较。在实际应用中,CB-S可以用于信息传播,或者降低路由协议中发现目的地的高昂成本。我们还在本文中提出了一种CB-SD(小区广播街道传播)变体,它具有CB-S的所有优点,并具有支持部分广播的额外好处。当需要向节点子集广播时,该方案更有效。
{"title":"A near-optimal broadcast technique for vehicular networks","authors":"A. H. Ho, Y. H. Ho, K. Hua, Roy Villafane","doi":"10.1109/WTS.2009.5068998","DOIUrl":"https://doi.org/10.1109/WTS.2009.5068998","url":null,"abstract":"A vehicular network is a promising application of mobile ad hoc networks. In this paper, we introduce a near-optimal broadcast technique, called CB-S (Cell Broadcast for Streets), for vehicular networks. In this environment, the road network is fragmented into cells such that nodes in a cell can communicate with any node within a two cell distance. Each mobile node is equipped with a GPS (Global Positioning System) unit and a map of the cells. The cell map has information about the cells including their identifier and the coordinates of the upper-right and lower-left corner of each cell. CB-S has the following desirable property. Broadcast of a message is performed by rebroadcasting the message from every other cell in the terrain. This characteristic allows CB-S to achieve near optimal performance. Our simulation results indicate that data can always reach all nodes in the wireless network. This perfect coverage is achieved with minimal overhead. That is, CB-S uses a near optimal (minimum) number of nodes to disseminate the data packets. This optimality gives it the advantage of minimum delay. To show these benefits, we give simulations results to compare CB-S with four other broadcast techniques. In practice, CB-S can be used for information dissemination, or to reduce the high cost of destination discovery in routing protocols. We also present in this paper a CB-SD (Cell Broadcast for Street Dissemination) variant that has all the advantages of CB-S, with the additional benefit of supporting partial broadcast. This scheme is more efficient when broadcast to a subset of the nodes is desirable.","PeriodicalId":313087,"journal":{"name":"2009 Wireless Telecommunications Symposium","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125504125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
TALONet: A power-efficient grid-based congestion avoidance scheme using multi-detouring technique in Wireless Sensor Networks TALONet:无线传感器网络中基于多绕路技术的高能效网格拥塞避免方案
Pub Date : 2009-04-22 DOI: 10.1109/WTS.2009.5068973
Jyh-ming Huang, Chun-Yi Li, Kuong-Ho Chen
Traffic congestion avoidance is a critical issue associated with data routing in Wireless Sensor Networks (WSNs). Previous researches employ either traffic or resource control strategies as solutions. In this paper, we propose an energy-efficient grid-based traffic congestion avoidance scheme in WSNs, termed as TALONet. With our mechanism, the approaches applied to avoid congestion have three folds: 1) we use two different transmission power levels to alleviate the link-level congestion (LLC); 2) we also employ an effective buffer management approach to avoid node-level congestion (NLC); and 3) based on virtual grid frameworks, a multi-path detouring technique is used to increase the channel capacity for the congested traffic flows. Extensive simulation results show that our proposed TALONet scheme is superior to other existing protocols. Comparing to TARA [11], Backpressure, and naïve (without congestion control) schemes, the improvement on the number of dropped packets can be achieved to about 45%, 51%, and 80%, respectively.
在无线传感器网络中,避免交通拥塞是与数据路由相关的一个关键问题。以往的研究要么采用流量控制策略,要么采用资源控制策略。在本文中,我们提出了一种节能的基于网格的WSNs交通拥塞避免方案,称为TALONet。在我们的机制下,用于避免拥塞的方法有三个方面:1)我们使用两种不同的传输功率级别来缓解链路级拥塞(LLC);2)我们还采用了有效的缓冲区管理方法来避免节点级拥塞(NLC);3)基于虚拟网格框架,采用多路径绕行技术提高拥堵交通流的通道容量。大量的仿真结果表明,我们提出的TALONet方案优于其他现有协议。与TARA[11]、Backpressure和naïve(无拥塞控制)方案相比,丢包数的改善分别约为45%、51%和80%。
{"title":"TALONet: A power-efficient grid-based congestion avoidance scheme using multi-detouring technique in Wireless Sensor Networks","authors":"Jyh-ming Huang, Chun-Yi Li, Kuong-Ho Chen","doi":"10.1109/WTS.2009.5068973","DOIUrl":"https://doi.org/10.1109/WTS.2009.5068973","url":null,"abstract":"Traffic congestion avoidance is a critical issue associated with data routing in Wireless Sensor Networks (WSNs). Previous researches employ either traffic or resource control strategies as solutions. In this paper, we propose an energy-efficient grid-based traffic congestion avoidance scheme in WSNs, termed as TALONet. With our mechanism, the approaches applied to avoid congestion have three folds: 1) we use two different transmission power levels to alleviate the link-level congestion (LLC); 2) we also employ an effective buffer management approach to avoid node-level congestion (NLC); and 3) based on virtual grid frameworks, a multi-path detouring technique is used to increase the channel capacity for the congested traffic flows. Extensive simulation results show that our proposed TALONet scheme is superior to other existing protocols. Comparing to TARA [11], Backpressure, and naïve (without congestion control) schemes, the improvement on the number of dropped packets can be achieved to about 45%, 51%, and 80%, respectively.","PeriodicalId":313087,"journal":{"name":"2009 Wireless Telecommunications Symposium","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121884972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Assessment of optimum geometric distribution of anchors in non-GNSS wireless location systems 非gnss无线定位系统中锚点最佳几何分布的评估
Pub Date : 2009-04-22 DOI: 10.1109/WTS.2009.5068984
S. Mazuelas, A. Bahillo, J. Prieto, R. Lorenzo, J. Blas, P. Fernández, F. A. Lago
The final precision achieved by a wireless location system depends basically on the accuracy of the range estimates and on the geometric distribution between anchors and target, being the second issue easier to manage in the design of a wireless location system. The results related to the impact of the geometric distribution, addressed for GNSS location systems, cannot be used directly to other wireless location systems, since the trilateration algorithms used and the characteristics of range estimates can be rather different. In this paper we develop an exhaustive study on the impact of the geometric distribution of anchors for the two most usual algorithms used in non-GNSS wireless location systems, taking into account the non ideal characteristics of the range noises in those location systems. From this study we present two parameters, particular to these two algorithms, which quantify the suitability of the geometric distribution taking values between 0 and 1, depending only on the geometric distributions. We show that armed with these new parameters, it is possible to design the wireless location system in an optimum way. Moreover, we present more optimum geometric distributions than the ones known in the literature.
无线定位系统所达到的最终精度基本上取决于距离估计的精度以及锚点和目标之间的几何分布,这是无线定位系统设计中第二个易于管理的问题。与GNSS定位系统的几何分布影响有关的结果不能直接用于其他无线定位系统,因为所使用的三边测量算法和距离估计的特征可能相当不同。在本文中,我们对锚点几何分布对非gnss无线定位系统中使用的两种最常用算法的影响进行了详尽的研究,同时考虑了这些定位系统中距离噪声的非理想特性。从这项研究中,我们提出了两个参数,特别是这两个算法,它们量化了取值在0到1之间的几何分布的适用性,仅取决于几何分布。研究表明,有了这些新的参数,就有可能以最优的方式设计无线定位系统。此外,我们提出了比文献中已知的更优的几何分布。
{"title":"Assessment of optimum geometric distribution of anchors in non-GNSS wireless location systems","authors":"S. Mazuelas, A. Bahillo, J. Prieto, R. Lorenzo, J. Blas, P. Fernández, F. A. Lago","doi":"10.1109/WTS.2009.5068984","DOIUrl":"https://doi.org/10.1109/WTS.2009.5068984","url":null,"abstract":"The final precision achieved by a wireless location system depends basically on the accuracy of the range estimates and on the geometric distribution between anchors and target, being the second issue easier to manage in the design of a wireless location system. The results related to the impact of the geometric distribution, addressed for GNSS location systems, cannot be used directly to other wireless location systems, since the trilateration algorithms used and the characteristics of range estimates can be rather different. In this paper we develop an exhaustive study on the impact of the geometric distribution of anchors for the two most usual algorithms used in non-GNSS wireless location systems, taking into account the non ideal characteristics of the range noises in those location systems. From this study we present two parameters, particular to these two algorithms, which quantify the suitability of the geometric distribution taking values between 0 and 1, depending only on the geometric distributions. We show that armed with these new parameters, it is possible to design the wireless location system in an optimum way. Moreover, we present more optimum geometric distributions than the ones known in the literature.","PeriodicalId":313087,"journal":{"name":"2009 Wireless Telecommunications Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129196272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Throughput performance of quantized proportional fair scheduling with adaptive modulation and coding 自适应调制编码量化比例公平调度的吞吐量性能
Pub Date : 2009-04-22 DOI: 10.1109/WTS.2009.5068994
F. Ishizaki, G. Hwang
Assuming a logarithmic rate model for SISO (Single-Input Single-Output) systems, the information theoretic capacity under scheduling algorithms exploiting multiuser diversity in wireless networks has been studied so far. However, in many cases, the throughput achieved in real wireless networks is very different from (and is much less than) the information theoretic capacity obtained under the assumption of the logarithmic rate model, and the rate functions in real wireless networks are very different from the logarithmic rate model. Hence, to examine the usefulness of the scheduling algorithms exploiting multiuser diversity in real wireless networks, we should study the throughput performance under more realistic rate function model rather than the information theoretic capacity under the logarithmic rate model. In this paper, we consider a wireless network where QPF (Quantized Proportional Fair) scheduling and AMC (adaptive modulation and coding) scheme are employed. Assuming a realistic rate function of AMC, we then analyze the throughput performance under the QPF scheduling with the AMC scheme. We also provide numerical results to investigate the usefulness of the QPF scheduling with the AMC scheme.
假设单输入单输出系统的对数速率模型,研究了无线网络中利用多用户分集的调度算法下的信息理论容量。然而,在很多情况下,实际无线网络中获得的吞吐量与对数速率模型假设下获得的信息理论容量相差很大(甚至远远小于),并且实际无线网络中的速率函数与对数速率模型有很大的不同。因此,为了检验利用多用户分集的调度算法在实际无线网络中的有效性,我们应该研究更真实的速率函数模型下的吞吐量性能,而不是对数速率模型下的信息论容量。本文研究了一种采用QPF(量化比例公平)调度和AMC(自适应调制和编码)方案的无线网络。假设AMC的实际速率函数,分析了采用AMC调度方案的QPF调度下的吞吐量性能。我们还提供了数值结果来研究AMC方案下QPF调度的有效性。
{"title":"Throughput performance of quantized proportional fair scheduling with adaptive modulation and coding","authors":"F. Ishizaki, G. Hwang","doi":"10.1109/WTS.2009.5068994","DOIUrl":"https://doi.org/10.1109/WTS.2009.5068994","url":null,"abstract":"Assuming a logarithmic rate model for SISO (Single-Input Single-Output) systems, the information theoretic capacity under scheduling algorithms exploiting multiuser diversity in wireless networks has been studied so far. However, in many cases, the throughput achieved in real wireless networks is very different from (and is much less than) the information theoretic capacity obtained under the assumption of the logarithmic rate model, and the rate functions in real wireless networks are very different from the logarithmic rate model. Hence, to examine the usefulness of the scheduling algorithms exploiting multiuser diversity in real wireless networks, we should study the throughput performance under more realistic rate function model rather than the information theoretic capacity under the logarithmic rate model. In this paper, we consider a wireless network where QPF (Quantized Proportional Fair) scheduling and AMC (adaptive modulation and coding) scheme are employed. Assuming a realistic rate function of AMC, we then analyze the throughput performance under the QPF scheduling with the AMC scheme. We also provide numerical results to investigate the usefulness of the QPF scheduling with the AMC scheme.","PeriodicalId":313087,"journal":{"name":"2009 Wireless Telecommunications Symposium","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129343547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
CHIRON: An energy-efficient chain-based hierarchical routing protocol in wireless sensor networks CHIRON:无线传感器网络中基于链的高能效分层路由协议
Pub Date : 2009-04-22 DOI: 10.1109/WTS.2009.5068960
Kuong-Ho Chen, Jyh-ming Huang, Chieh-Chuan Hsiao
Due to the power restriction of sensor nodes, efficient routing, in wireless sensor networks, is a critical approach to saving node's energy and thus prolonging the network lifetime. Even the chain-based routing is one of significant routing mechanisms, several common flaws, such as data propagation delay and redundant transmission, are associated. In this paper, we propose an energy efficient Chain-Based Hierarchical Routing Protocol, named as CHIRON, to alleviate such deficiencies. Based on the BeamStar concept [9], the main idea of CHIRON is to split the sensing field into a number of smaller areas, so that it can create multiple shorter chains to reduce the data transmission delay and redundant path, and therefore effectively conserve the node energy and prolong the network lifetime. Simulation results show that, in contrast to Enhanced PEGASIS and PEGASIS protocols, the proposed CHIRON can achieve about 15% and 168% improvements on average data propagation delay, 30% and 65% improvements on redundant transmission path, respectively. By these contributions, the network lifetime can also be extended to about 14%∼7% and 50%∼23%, under various small and large simulation areas, respectively.
由于传感器节点的功率限制,在无线传感器网络中,高效路由是节省节点能量从而延长网络寿命的关键途径。尽管基于链的路由是重要的路由机制之一,但它也存在一些常见的缺陷,如数据传播延迟和冗余传输。在本文中,我们提出了一种节能的基于链的分层路由协议,称为CHIRON,以减轻这些缺陷。CHIRON基于BeamStar概念[9],其主要思想是将传感场分割成多个较小的区域,从而形成多个较短的链,以减少数据传输延迟和冗余路径,从而有效节约节点能量,延长网络寿命。仿真结果表明,与增强PEGASIS和PEGASIS协议相比,所提出的CHIRON协议的平均数据传播延迟分别提高了15%和168%,冗余传输路径分别提高了30%和65%。通过这些贡献,在各种小型和大型模拟区域下,网络寿命也可以分别延长到约14% ~ 7%和50% ~ 23%。
{"title":"CHIRON: An energy-efficient chain-based hierarchical routing protocol in wireless sensor networks","authors":"Kuong-Ho Chen, Jyh-ming Huang, Chieh-Chuan Hsiao","doi":"10.1109/WTS.2009.5068960","DOIUrl":"https://doi.org/10.1109/WTS.2009.5068960","url":null,"abstract":"Due to the power restriction of sensor nodes, efficient routing, in wireless sensor networks, is a critical approach to saving node's energy and thus prolonging the network lifetime. Even the chain-based routing is one of significant routing mechanisms, several common flaws, such as data propagation delay and redundant transmission, are associated. In this paper, we propose an energy efficient Chain-Based Hierarchical Routing Protocol, named as CHIRON, to alleviate such deficiencies. Based on the BeamStar concept [9], the main idea of CHIRON is to split the sensing field into a number of smaller areas, so that it can create multiple shorter chains to reduce the data transmission delay and redundant path, and therefore effectively conserve the node energy and prolong the network lifetime. Simulation results show that, in contrast to Enhanced PEGASIS and PEGASIS protocols, the proposed CHIRON can achieve about 15% and 168% improvements on average data propagation delay, 30% and 65% improvements on redundant transmission path, respectively. By these contributions, the network lifetime can also be extended to about 14%∼7% and 50%∼23%, under various small and large simulation areas, respectively.","PeriodicalId":313087,"journal":{"name":"2009 Wireless Telecommunications Symposium","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127764460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 77
Development and implementation of authenticated multi-user mobile Java applications 开发和实现身份验证的多用户移动Java应用程序
Pub Date : 2009-04-22 DOI: 10.1109/WTS.2009.5068972
J. Shell
Across the globe mobile devices are a facet of everyday life. The technology that is encapsulated within these units is accelerating at a phenomenal rate. The addition of a wide range of network connectivity, from InfraRed (IR) to Wireless Local Area Network (WLAN) and more predominantly Bluetooth, has increased the scope of the applications that can be developed and utilised within this market. The demands of ever evolving technology within mobile phones places large burdens on developers to deploy applications to market at an equal rate. Previous pieces of research have highlighted the benefits of utilising a framework in the development of applications. Through the use of Iterative modeling and software prototypes this paper presents an application framework to reduce the complexity and knowledge base necessary to construct a Bluetooth multi-user application. To reduce hardware dependency the framework has been developed on Java 2 Platform, Micro Edition (J2ME). It is also identified that Bluetooth technology within resource restricted devices is prone to security issues. The issues surrounding human interaction in device authentication are addressed by this paper through the addition of an automated Diffie-Hellman key exchange authentication connection process.
在全球范围内,移动设备是日常生活的一个方面。封装在这些单元中的技术正在以惊人的速度加速发展。从红外(IR)到无线局域网(WLAN),以及更主要的蓝牙,广泛的网络连接的增加,增加了在这个市场中可以开发和利用的应用范围。移动电话中不断发展的技术的需求给开发人员以同样的速度向市场部署应用程序带来了巨大的负担。之前的研究已经强调了在应用程序开发中使用框架的好处。通过使用迭代建模和软件原型,本文提出了一个应用程序框架,以减少构建蓝牙多用户应用程序所需的复杂性和知识库。为了减少对硬件的依赖,该框架是在Java 2 Platform, Micro Edition (J2ME)上开发的。研究还发现,在资源受限的设备中使用蓝牙技术容易出现安全问题。本文通过增加一个自动的Diffie-Hellman密钥交换认证连接过程,解决了围绕设备认证中人机交互的问题。
{"title":"Development and implementation of authenticated multi-user mobile Java applications","authors":"J. Shell","doi":"10.1109/WTS.2009.5068972","DOIUrl":"https://doi.org/10.1109/WTS.2009.5068972","url":null,"abstract":"Across the globe mobile devices are a facet of everyday life. The technology that is encapsulated within these units is accelerating at a phenomenal rate. The addition of a wide range of network connectivity, from InfraRed (IR) to Wireless Local Area Network (WLAN) and more predominantly Bluetooth, has increased the scope of the applications that can be developed and utilised within this market. The demands of ever evolving technology within mobile phones places large burdens on developers to deploy applications to market at an equal rate. Previous pieces of research have highlighted the benefits of utilising a framework in the development of applications. Through the use of Iterative modeling and software prototypes this paper presents an application framework to reduce the complexity and knowledge base necessary to construct a Bluetooth multi-user application. To reduce hardware dependency the framework has been developed on Java 2 Platform, Micro Edition (J2ME). It is also identified that Bluetooth technology within resource restricted devices is prone to security issues. The issues surrounding human interaction in device authentication are addressed by this paper through the addition of an automated Diffie-Hellman key exchange authentication connection process.","PeriodicalId":313087,"journal":{"name":"2009 Wireless Telecommunications Symposium","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126242493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New attacks on UMTS network access 针对UMTS网络接入的新攻击
Pub Date : 2009-04-22 DOI: 10.1109/WTS.2009.5068979
Z. Ahmadian, Somayeh Salimi, A. Salahi
In this paper we propose two new attacks on UMTS network. Both attacks exploit the UMTS-GSM interworking and are possible in the GSM access area of UMTS network. The first attack allows the attacker to eavesdrop on the entire traffic of the victim UMTS subscriber in the GERAN coverage of the UMTS network. The second attack is an impersonation attack i.e. the attacker impersonates a genuine UMTS subscriber to a UMTS network and fools the network to provide services at the expense of the victim subscriber in its GERAN coverage.
本文提出了两种新的针对UMTS网络的攻击方法。这两种攻击都利用了UMTS-GSM的互通,都可能在UMTS网络的GSM接入区进行。第一种攻击允许攻击者在UMTS网络的GERAN覆盖范围内窃听受害者UMTS用户的整个流量。第二种攻击是模拟攻击,即攻击者在UMTS网络中冒充真正的UMTS用户,并欺骗网络以牺牲受害者用户在其GERAN覆盖范围内提供服务。
{"title":"New attacks on UMTS network access","authors":"Z. Ahmadian, Somayeh Salimi, A. Salahi","doi":"10.1109/WTS.2009.5068979","DOIUrl":"https://doi.org/10.1109/WTS.2009.5068979","url":null,"abstract":"In this paper we propose two new attacks on UMTS network. Both attacks exploit the UMTS-GSM interworking and are possible in the GSM access area of UMTS network. The first attack allows the attacker to eavesdrop on the entire traffic of the victim UMTS subscriber in the GERAN coverage of the UMTS network. The second attack is an impersonation attack i.e. the attacker impersonates a genuine UMTS subscriber to a UMTS network and fools the network to provide services at the expense of the victim subscriber in its GERAN coverage.","PeriodicalId":313087,"journal":{"name":"2009 Wireless Telecommunications Symposium","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131422221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Achieving higher HSDPA performance and preserving R99 soft handover control by large scale optimization in CPICH coverage planning 在CPICH覆盖规划中,通过大规模优化实现更高的HSDPA性能和保持R99软切换控制
Pub Date : 2009-04-22 DOI: 10.1109/WTS.2009.5068936
Lei Chen, D. Yuan
Common Pilot Channel (CPICH) power is a crucial parameter in coverage planning of today's UMTS networks that implement both HSDPA and R99 services. Adopting a non-uniform allocation of cell CPICH power and minimizing its amount necessary for coverage, the resulting power saving significantly improves HSDPA performance. At the same time, it is vital to have the desired level R99 soft handover, which is heavily influenced by CPICH. In this paper, we demonstrate how large scale optimization can deal with both tasks. Our approach focuses on enhancing cell-edge HSDPA data rate, subject to requirements of CPICH coverage and the level of R99 soft(-er) handover. We present a solution algorithm that optimizes CPICH allocation for HSDPA performance, and, in parallel, offers accurate control of R99 soft handover. Experimental results for large and realistic network planning scenarios demonstrate the benefit of our optimization approach.
通用导频信道(CPICH)功率是当今实现HSDPA和R99服务的UMTS网络覆盖规划中的一个关键参数。采用非均匀分配小区CPICH功率,并尽量减少覆盖所需的功率,从而大大提高了HSDPA性能。同时,具有理想水平的R99软切换是至关重要的,这是受CPICH影响很大的。在本文中,我们演示了大规模优化如何处理这两项任务。我们的方法侧重于提高蜂窝边缘HSDPA数据速率,并受CPICH覆盖要求和R99软(-er)切换水平的限制。我们提出了一种优化CPICH分配以实现HSDPA性能的解决算法,并提供了R99软切换的精确控制。大型和现实的网络规划场景的实验结果证明了我们的优化方法的好处。
{"title":"Achieving higher HSDPA performance and preserving R99 soft handover control by large scale optimization in CPICH coverage planning","authors":"Lei Chen, D. Yuan","doi":"10.1109/WTS.2009.5068936","DOIUrl":"https://doi.org/10.1109/WTS.2009.5068936","url":null,"abstract":"Common Pilot Channel (CPICH) power is a crucial parameter in coverage planning of today's UMTS networks that implement both HSDPA and R99 services. Adopting a non-uniform allocation of cell CPICH power and minimizing its amount necessary for coverage, the resulting power saving significantly improves HSDPA performance. At the same time, it is vital to have the desired level R99 soft handover, which is heavily influenced by CPICH. In this paper, we demonstrate how large scale optimization can deal with both tasks. Our approach focuses on enhancing cell-edge HSDPA data rate, subject to requirements of CPICH coverage and the level of R99 soft(-er) handover. We present a solution algorithm that optimizes CPICH allocation for HSDPA performance, and, in parallel, offers accurate control of R99 soft handover. Experimental results for large and realistic network planning scenarios demonstrate the benefit of our optimization approach.","PeriodicalId":313087,"journal":{"name":"2009 Wireless Telecommunications Symposium","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116302716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A comparison of MANET emulation techniques for the production of a realistic testbed with global communication capabilities 为生产具有全球通信能力的现实试验台而进行的MANET仿真技术的比较
Pub Date : 2009-04-22 DOI: 10.1109/WTS.2009.5068955
William Palmer, B. McCarthy, C. Edwards
The process of testing software that is to be deployed across an adhoc mobile networking environment is inherently challenging. The mobile domain introduces variable conditions mainly due to the wireless communications and the changing topology of the underlying network. Testing software is therefore difficult because of the sheer number of variables that must be considered in order to realistically replicate the intended deployment environment. In this paper we provide a comparison of two static, lab-based Mobile Adhoc Network (MANET) emulation techniques: MAC address filtration and channel separation. These techniques were deployed and tested on a testbed that had global communication links to the Internet. These techniques have been designed to help developers emulate the effects that mobility will have on their protocols and applications in a realistic environment, while reducing resource cost and logistical complexities that are inherent problems when testing across the intended network deployment. Specifically, we focus on the radio interference apparent in the two emulation techniques and show its affect on network performance.
测试将部署在临时移动网络环境中的软件的过程本身就具有挑战性。移动领域主要由于无线通信和底层网络拓扑结构的变化而引入了可变条件。因此,测试软件是困难的,因为为了真实地复制预期的部署环境,必须考虑大量的变量。在本文中,我们提供了两种静态的,基于实验室的移动自组网(MANET)仿真技术的比较:MAC地址过滤和信道分离。这些技术在一个与Internet有全球通信连接的测试平台上进行了部署和测试。这些技术旨在帮助开发人员在现实环境中模拟移动性对其协议和应用程序的影响,同时降低资源成本和后勤复杂性,这些都是跨预期网络部署进行测试时的固有问题。具体来说,我们重点研究了两种仿真技术中明显存在的无线电干扰,并展示了其对网络性能的影响。
{"title":"A comparison of MANET emulation techniques for the production of a realistic testbed with global communication capabilities","authors":"William Palmer, B. McCarthy, C. Edwards","doi":"10.1109/WTS.2009.5068955","DOIUrl":"https://doi.org/10.1109/WTS.2009.5068955","url":null,"abstract":"The process of testing software that is to be deployed across an adhoc mobile networking environment is inherently challenging. The mobile domain introduces variable conditions mainly due to the wireless communications and the changing topology of the underlying network. Testing software is therefore difficult because of the sheer number of variables that must be considered in order to realistically replicate the intended deployment environment. In this paper we provide a comparison of two static, lab-based Mobile Adhoc Network (MANET) emulation techniques: MAC address filtration and channel separation. These techniques were deployed and tested on a testbed that had global communication links to the Internet. These techniques have been designed to help developers emulate the effects that mobility will have on their protocols and applications in a realistic environment, while reducing resource cost and logistical complexities that are inherent problems when testing across the intended network deployment. Specifically, we focus on the radio interference apparent in the two emulation techniques and show its affect on network performance.","PeriodicalId":313087,"journal":{"name":"2009 Wireless Telecommunications Symposium","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121998830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2009 Wireless Telecommunications Symposium
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1