Pub Date : 2009-04-22DOI: 10.1109/WTS.2009.5068993
T. Chrysikos, S. Kotsopoulos
Recent published works have manifested a renewed interest in the impact of the wireless channel itself on the achievable level of secure information exchange between two or more communication nodes, in the presence of an undesired eavesdropper, developing the research field of Wireless Information-Theoretic Security (WITS). For quasi-static Rayleigh fading channels, information-theoretic security has been proven to be achievable even when the eavesdropper's channel has a better average Signal-to-Noise Ratio (SNR) than the main channel, thus bypassing the limits considered in the classic AWGN-channels model. In these works, a typical value has been assigned to the path loss exponent that dominates the distance ratio (faction of distance between the legitimate receiver and the transmitter to the distance between the eavesdropper and the transmitter). Extensive research has proven, however, that the path loss exponent value varies according to the type and the intrinsic characteristics of the wireless channel in question. In our work, we take into account this variation of the path loss exponent and examine its impact on the secrecy capacity and the outage probability for a given normalized secrecy rate. Our results establish a link between the different types of wireless environment and the boundaries of secure communications.
{"title":"Impact of channel-dependent variation of path loss exponent on Wireless Information-Theoretic Security","authors":"T. Chrysikos, S. Kotsopoulos","doi":"10.1109/WTS.2009.5068993","DOIUrl":"https://doi.org/10.1109/WTS.2009.5068993","url":null,"abstract":"Recent published works have manifested a renewed interest in the impact of the wireless channel itself on the achievable level of secure information exchange between two or more communication nodes, in the presence of an undesired eavesdropper, developing the research field of Wireless Information-Theoretic Security (WITS). For quasi-static Rayleigh fading channels, information-theoretic security has been proven to be achievable even when the eavesdropper's channel has a better average Signal-to-Noise Ratio (SNR) than the main channel, thus bypassing the limits considered in the classic AWGN-channels model. In these works, a typical value has been assigned to the path loss exponent that dominates the distance ratio (faction of distance between the legitimate receiver and the transmitter to the distance between the eavesdropper and the transmitter). Extensive research has proven, however, that the path loss exponent value varies according to the type and the intrinsic characteristics of the wireless channel in question. In our work, we take into account this variation of the path loss exponent and examine its impact on the secrecy capacity and the outage probability for a given normalized secrecy rate. Our results establish a link between the different types of wireless environment and the boundaries of secure communications.","PeriodicalId":313087,"journal":{"name":"2009 Wireless Telecommunications Symposium","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116014738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-04-22DOI: 10.1109/WTS.2009.5068995
E. Lehtonen, A. Dudkov, J. Paavola
In this paper signal-to-interference ratio for precoded Welch-bound signature sets is derived for oversaturated synchronous CDMA system. For this, a novel definition for CDMA precoding is given and a general correlation result is presented. It is shown that the system with precoding outperforms the system without it, assuming that conventional receiver is used.
{"title":"Precoding Welch-bound signature sets","authors":"E. Lehtonen, A. Dudkov, J. Paavola","doi":"10.1109/WTS.2009.5068995","DOIUrl":"https://doi.org/10.1109/WTS.2009.5068995","url":null,"abstract":"In this paper signal-to-interference ratio for precoded Welch-bound signature sets is derived for oversaturated synchronous CDMA system. For this, a novel definition for CDMA precoding is given and a general correlation result is presented. It is shown that the system with precoding outperforms the system without it, assuming that conventional receiver is used.","PeriodicalId":313087,"journal":{"name":"2009 Wireless Telecommunications Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131084866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-04-22DOI: 10.1109/WTS.2009.5069000
Jun-Ho Jeon, Moo-Kwang Byeon, Sung-Joon Park
We have designed and implemented an underwater modem using a general-purpose waterproof ultrasonic sensor which is approriate for UWSN owing to its low-power property and extremely low cost. As a succeeding work, we will try to improve the performance of the underwater modem in terms of data rate and communication distance by adopting state-of-art transmission technology.
{"title":"Poster abstract: A point-to-multipoint acoustic modem for underwater wireless sensor networks","authors":"Jun-Ho Jeon, Moo-Kwang Byeon, Sung-Joon Park","doi":"10.1109/WTS.2009.5069000","DOIUrl":"https://doi.org/10.1109/WTS.2009.5069000","url":null,"abstract":"We have designed and implemented an underwater modem using a general-purpose waterproof ultrasonic sensor which is approriate for UWSN owing to its low-power property and extremely low cost. As a succeeding work, we will try to improve the performance of the underwater modem in terms of data rate and communication distance by adopting state-of-art transmission technology.","PeriodicalId":313087,"journal":{"name":"2009 Wireless Telecommunications Symposium","volume":"40 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131236937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-04-22DOI: 10.1109/WTS.2009.5068944
J. Holub, J. Micka
End-to-end telecommunication network simulator design and realization is described in the paper. The main applications of the simulator are conversational tests e.g. as per ITU-T P.800 and demonstrations. The simulator can be also used as a replacement of telecommunication chain part that is missing during end-to-end testing or measurements. Examples of achieved subjective test results are presented.
{"title":"End-to-end network simulator for conversational quality measurements","authors":"J. Holub, J. Micka","doi":"10.1109/WTS.2009.5068944","DOIUrl":"https://doi.org/10.1109/WTS.2009.5068944","url":null,"abstract":"End-to-end telecommunication network simulator design and realization is described in the paper. The main applications of the simulator are conversational tests e.g. as per ITU-T P.800 and demonstrations. The simulator can be also used as a replacement of telecommunication chain part that is missing during end-to-end testing or measurements. Examples of achieved subjective test results are presented.","PeriodicalId":313087,"journal":{"name":"2009 Wireless Telecommunications Symposium","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132912422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-04-22DOI: 10.1109/WTS.2009.5068986
Rafael Montalban Gutierrez, G. Seco-Granados
In this paper the performance of LDPC-LDGM codes and Raptor codes is studied and compared in terms of efficiency. LDPC-LDGM and Raptor are FEC codifications that can be applied at packet level. PL-FEC consists in including redundant packets in the transmission to ensure correct reception. Althought these techniques have been previously studied in the literature, they have usually been compared with the performance of small block Reed Solomon codes. This paper presents a novel comparison between the performance of LDPC-LDGM codes and Raptor codes as alternatives for packet level FEC when large codification blocks are needed. The results obtained show that Raptor codes clearly outperform LDPC-LDGM codes in almost all scenarios.
{"title":"Efficiency comparison of LDPC-LDGM and Raptor codes for PL-FEC with very large block sizes","authors":"Rafael Montalban Gutierrez, G. Seco-Granados","doi":"10.1109/WTS.2009.5068986","DOIUrl":"https://doi.org/10.1109/WTS.2009.5068986","url":null,"abstract":"In this paper the performance of LDPC-LDGM codes and Raptor codes is studied and compared in terms of efficiency. LDPC-LDGM and Raptor are FEC codifications that can be applied at packet level. PL-FEC consists in including redundant packets in the transmission to ensure correct reception. Althought these techniques have been previously studied in the literature, they have usually been compared with the performance of small block Reed Solomon codes. This paper presents a novel comparison between the performance of LDPC-LDGM codes and Raptor codes as alternatives for packet level FEC when large codification blocks are needed. The results obtained show that Raptor codes clearly outperform LDPC-LDGM codes in almost all scenarios.","PeriodicalId":313087,"journal":{"name":"2009 Wireless Telecommunications Symposium","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122342950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-04-22DOI: 10.1109/WTS.2009.5068939
A. Alexiou, C. Bouras, V. Kokkinos
Long Term Evolution (LTE) promises the delivery of rich multimedia services in a more power and spectral efficient way than its predecessor Universal Mobile Telecommunication System (UMTS). To this direction, the newly introduced Enhanced - Multimedia Broadcast/Multicast Service (E-MBMS) framework is envisaged to play a fundamental role during the LTE standardization. E-MBMS constitutes the successor of MBMS which was introduced in the Release 6 of UMTS in order to deliver multimedia data from a single source entity to multiple destinations. This paper proposes a novel mechanism for efficient radio bearer selection during E-MBMS transmissions in LTE networks. The proposed mechanism is based on the concept of transport channels combination (point-to-point and/or point-to-multipoint radio bearers) in any cell/sector of the network in which multicast users are residing. The mechanism is evaluated through several realistic scenarios and is compared with several radio bearer selection mechanisms in order to highlight the enhancements that it provides.
{"title":"An enhanced MBMS power control mechanism towards Long Term Evolution","authors":"A. Alexiou, C. Bouras, V. Kokkinos","doi":"10.1109/WTS.2009.5068939","DOIUrl":"https://doi.org/10.1109/WTS.2009.5068939","url":null,"abstract":"Long Term Evolution (LTE) promises the delivery of rich multimedia services in a more power and spectral efficient way than its predecessor Universal Mobile Telecommunication System (UMTS). To this direction, the newly introduced Enhanced - Multimedia Broadcast/Multicast Service (E-MBMS) framework is envisaged to play a fundamental role during the LTE standardization. E-MBMS constitutes the successor of MBMS which was introduced in the Release 6 of UMTS in order to deliver multimedia data from a single source entity to multiple destinations. This paper proposes a novel mechanism for efficient radio bearer selection during E-MBMS transmissions in LTE networks. The proposed mechanism is based on the concept of transport channels combination (point-to-point and/or point-to-multipoint radio bearers) in any cell/sector of the network in which multicast users are residing. The mechanism is evaluated through several realistic scenarios and is compared with several radio bearer selection mechanisms in order to highlight the enhancements that it provides.","PeriodicalId":313087,"journal":{"name":"2009 Wireless Telecommunications Symposium","volume":"49 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121201012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-04-22DOI: 10.1109/WTS.2009.5068978
M. Hoseinzade, K. Mohamed-Pour, S. Andargoli, Hazhir Shokri-Razaghi
In this paper, we propose the new channel estimation algorithm in frequency domain for orthogonal frequency division multiplexing (OFDM) system in fast fading channels. In this algorithm first we estimate channel response at pilot subcarriers then interpolate channel response at data subcarriers by Gaussian Radial basis function as an efficient nonlinear interpolator. At next step by filtering and processing on the estimated channel taps and using iterative decision feedback we improve accuracy of our channel estimation algorithm. We evaluate and compare performance of our proposed algorithm to similar algorithms by simulation.
{"title":"New decision feedback channel estimation for OFDM systems","authors":"M. Hoseinzade, K. Mohamed-Pour, S. Andargoli, Hazhir Shokri-Razaghi","doi":"10.1109/WTS.2009.5068978","DOIUrl":"https://doi.org/10.1109/WTS.2009.5068978","url":null,"abstract":"In this paper, we propose the new channel estimation algorithm in frequency domain for orthogonal frequency division multiplexing (OFDM) system in fast fading channels. In this algorithm first we estimate channel response at pilot subcarriers then interpolate channel response at data subcarriers by Gaussian Radial basis function as an efficient nonlinear interpolator. At next step by filtering and processing on the estimated channel taps and using iterative decision feedback we improve accuracy of our channel estimation algorithm. We evaluate and compare performance of our proposed algorithm to similar algorithms by simulation.","PeriodicalId":313087,"journal":{"name":"2009 Wireless Telecommunications Symposium","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115518622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-04-22DOI: 10.1109/WTS.2009.5068985
N. Kryvinska, C. Strauss, P. Zinterhof
Inter-enterprise collaborative environments and applications enable users to utilize and manage voice, data and video services on a common IP-based network. As voice moves from its traditional separate network to having both user and trunk connections traverse the corporate IP network, the demands for uptime and quality of experience increase dramatically. When video-over-IP is layered onto the same infrastructure, the challenges become even greater as video and traditional data traffic can overload links and potentially degrade sensitive VoIP traffic. Furthermore, when all three services run over a single infrastructure, any failure can wipe out all communications. This paper addresses the challenge of how the newly converged network can be effectively deployed and managed for mission-critical, real-time services. We respond to this challenge by suggesting a model with the appropriate optimized planning, design, and further maintenance.
{"title":"Mobility in a multi-location enterprise network, case study: global voice calls placing","authors":"N. Kryvinska, C. Strauss, P. Zinterhof","doi":"10.1109/WTS.2009.5068985","DOIUrl":"https://doi.org/10.1109/WTS.2009.5068985","url":null,"abstract":"Inter-enterprise collaborative environments and applications enable users to utilize and manage voice, data and video services on a common IP-based network. As voice moves from its traditional separate network to having both user and trunk connections traverse the corporate IP network, the demands for uptime and quality of experience increase dramatically. When video-over-IP is layered onto the same infrastructure, the challenges become even greater as video and traditional data traffic can overload links and potentially degrade sensitive VoIP traffic. Furthermore, when all three services run over a single infrastructure, any failure can wipe out all communications. This paper addresses the challenge of how the newly converged network can be effectively deployed and managed for mission-critical, real-time services. We respond to this challenge by suggesting a model with the appropriate optimized planning, design, and further maintenance.","PeriodicalId":313087,"journal":{"name":"2009 Wireless Telecommunications Symposium","volume":"488 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121533494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-04-22DOI: 10.1109/WTS.2009.5069003
L. Auer, N. Kryvinska, C. Strauss
We concentrate in this paper on a SOI model and its interactions with local mobile devices while accessing the services on SOA-WSD. We also attempt to build an efficient framework that integrates the mobility of resource-limited devices (e.g. handhelds, cellular phones) with the processing power of the SOA-WSD platform.
{"title":"Service-oriented mobility architecture provides highly-configurable wireless services","authors":"L. Auer, N. Kryvinska, C. Strauss","doi":"10.1109/WTS.2009.5069003","DOIUrl":"https://doi.org/10.1109/WTS.2009.5069003","url":null,"abstract":"We concentrate in this paper on a SOI model and its interactions with local mobile devices while accessing the services on SOA-WSD. We also attempt to build an efficient framework that integrates the mobility of resource-limited devices (e.g. handhelds, cellular phones) with the processing power of the SOA-WSD platform.","PeriodicalId":313087,"journal":{"name":"2009 Wireless Telecommunications Symposium","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124457692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-04-22DOI: 10.1109/WTS.2009.5068992
H. Martikainen, O. Alanen, A. Sayenko
IEEE 802.16 standard defines two data retransmission mechanisms. HARQ provides fast retransmissions in cost of slightly increased overhead. On the contrary, ARQ has less overhead in cost of bit longer delays. It is therefore often used with BE connections. In addition to delay tolerant applications, BE can also be used for real-time services. Therefore, in this paper we analyze the ARQ mechanism and provide guidelines on how to set the ARQ parameters to achieve a good balance between the VoIP delay and packet loss.
{"title":"ARQ parameters for VoIP in IEEE 802.16 networks","authors":"H. Martikainen, O. Alanen, A. Sayenko","doi":"10.1109/WTS.2009.5068992","DOIUrl":"https://doi.org/10.1109/WTS.2009.5068992","url":null,"abstract":"IEEE 802.16 standard defines two data retransmission mechanisms. HARQ provides fast retransmissions in cost of slightly increased overhead. On the contrary, ARQ has less overhead in cost of bit longer delays. It is therefore often used with BE connections. In addition to delay tolerant applications, BE can also be used for real-time services. Therefore, in this paper we analyze the ARQ mechanism and provide guidelines on how to set the ARQ parameters to achieve a good balance between the VoIP delay and packet loss.","PeriodicalId":313087,"journal":{"name":"2009 Wireless Telecommunications Symposium","volume":"398 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122090626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}