首页 > 最新文献

2012 IEEE International Conference on Communications (ICC)最新文献

英文 中文
The LogLog counting reversible sketch: A distributed architecture for detecting anomalies in backbone networks LogLog计数可逆草图:用于检测骨干网络异常的分布式体系结构
Pub Date : 2012-06-10 DOI: 10.1109/ICC.2012.6363825
C. Callegari, A. D. Pietro, S. Giordano, Teresa Pepe, G. Procissi
The increasing number of network attacks causes growing problems for network operators and users. Thus, detecting anomalous traffic is of primary interest in IP networks management and many detection techniques, able to promptly reveal and identify network attacks, mainly detecting Heavy Changes (HCs) in the network traffic, have been proposed. Nevertheless, the recent spread of coordinated attacks, that occur in multiple networks simultaneously, makes extremely difficult the detection, using isolated intrusion detection systems that only monitor a limited portion of the Internet. For this reason in this paper we propose a novel distributed architecture that represents a general framework for the detection of network anomalies. The performance analysis, presented in this paper, demonstrates the effectiveness of the proposed architecture.
越来越多的网络攻击给网络运营商和用户带来了越来越多的问题。因此,检测异常流量是IP网络管理的主要兴趣,并且已经提出了许多能够及时揭示和识别网络攻击的检测技术,主要是检测网络流量中的重变化(hc)。然而,最近协同攻击的蔓延,同时发生在多个网络中,使得检测极其困难,使用孤立的入侵检测系统,只监控互联网的有限部分。因此,在本文中,我们提出了一种新的分布式架构,它代表了网络异常检测的通用框架。本文提出的性能分析证明了该体系结构的有效性。
{"title":"The LogLog counting reversible sketch: A distributed architecture for detecting anomalies in backbone networks","authors":"C. Callegari, A. D. Pietro, S. Giordano, Teresa Pepe, G. Procissi","doi":"10.1109/ICC.2012.6363825","DOIUrl":"https://doi.org/10.1109/ICC.2012.6363825","url":null,"abstract":"The increasing number of network attacks causes growing problems for network operators and users. Thus, detecting anomalous traffic is of primary interest in IP networks management and many detection techniques, able to promptly reveal and identify network attacks, mainly detecting Heavy Changes (HCs) in the network traffic, have been proposed. Nevertheless, the recent spread of coordinated attacks, that occur in multiple networks simultaneously, makes extremely difficult the detection, using isolated intrusion detection systems that only monitor a limited portion of the Internet. For this reason in this paper we propose a novel distributed architecture that represents a general framework for the detection of network anomalies. The performance analysis, presented in this paper, demonstrates the effectiveness of the proposed architecture.","PeriodicalId":331080,"journal":{"name":"2012 IEEE International Conference on Communications (ICC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116633000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Bayesian compressive sensing for adaptive measurement of radar signal 基于贝叶斯压缩感知的雷达信号自适应测量
Pub Date : 2012-06-10 DOI: 10.1109/ICC.2012.6364765
Wei Wang, Baoju Zhang
The theory of Bayesian Compressive Sensing is briefly introduced. An evaluation index based on differential entropy of estimated signal is devised and the adaptive compressive measurement procedure without any prior information about the measured signals is presented in block manner. Numerical simulations on random step signal and real radar signal verify that the adaptive algorithm has good performance. This novel offers great potential for adaptive compressive measuring real time signal.
简要介绍了贝叶斯压缩感知理论。设计了一种基于估计信号微分熵的评价指标,并以分块的方式提出了不含被测信号先验信息的自适应压缩测量方法。对随机步进信号和实际雷达信号的数值仿真验证了自适应算法的良好性能。该方法为实时信号的自适应压缩测量提供了巨大的潜力。
{"title":"Bayesian compressive sensing for adaptive measurement of radar signal","authors":"Wei Wang, Baoju Zhang","doi":"10.1109/ICC.2012.6364765","DOIUrl":"https://doi.org/10.1109/ICC.2012.6364765","url":null,"abstract":"The theory of Bayesian Compressive Sensing is briefly introduced. An evaluation index based on differential entropy of estimated signal is devised and the adaptive compressive measurement procedure without any prior information about the measured signals is presented in block manner. Numerical simulations on random step signal and real radar signal verify that the adaptive algorithm has good performance. This novel offers great potential for adaptive compressive measuring real time signal.","PeriodicalId":331080,"journal":{"name":"2012 IEEE International Conference on Communications (ICC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117188313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cooperative jamming for secrecy in decentralized wireless networks 分散无线网络中保密的协同干扰
Pub Date : 2012-06-10 DOI: 10.1109/ICC.2012.6364148
Xiangyun Zhou, M. Tao, R. Kennedy
Cooperative jamming as a physical layer security enhancement has recently drawn considerable attention. While most existing works focus on communication systems with a small number of nodes, we investigate the use of cooperative jamming for providing secrecy in large-scale decentralized networks consisting of randomly distributed legitimate users and eavesdroppers. A modified slotted ALOHA protocol, named CJ-ALOHA, is considered where each legitimate transmitter either sends its message signal or acts as a helping jammer according to a message transmission probability p. We derive the secrecy transmission capacity to characterize the network throughput and show how the throughput is affected by the CJ-ALOHA protocol. Both analytical and numerical insights are provided on the design of the CJ-ALOHA protocol for optimal throughput performance.
协同干扰作为一种物理层安全增强手段近年来引起了人们的广泛关注。虽然大多数现有工作都集中在具有少量节点的通信系统上,但我们研究了在由随机分布的合法用户和窃听者组成的大规模分散网络中使用协作干扰来提供保密。一种改进的槽ALOHA协议,命名为CJ-ALOHA,考虑其中每个合法发送器根据消息传输概率p发送其消息信号或充当辅助干扰器。我们推导了保密传输容量来表征网络吞吐量,并显示了吞吐量如何受到CJ-ALOHA协议的影响。在CJ-ALOHA协议的最佳吞吐量性能的设计上提供了分析和数值见解。
{"title":"Cooperative jamming for secrecy in decentralized wireless networks","authors":"Xiangyun Zhou, M. Tao, R. Kennedy","doi":"10.1109/ICC.2012.6364148","DOIUrl":"https://doi.org/10.1109/ICC.2012.6364148","url":null,"abstract":"Cooperative jamming as a physical layer security enhancement has recently drawn considerable attention. While most existing works focus on communication systems with a small number of nodes, we investigate the use of cooperative jamming for providing secrecy in large-scale decentralized networks consisting of randomly distributed legitimate users and eavesdroppers. A modified slotted ALOHA protocol, named CJ-ALOHA, is considered where each legitimate transmitter either sends its message signal or acts as a helping jammer according to a message transmission probability p. We derive the secrecy transmission capacity to characterize the network throughput and show how the throughput is affected by the CJ-ALOHA protocol. Both analytical and numerical insights are provided on the design of the CJ-ALOHA protocol for optimal throughput performance.","PeriodicalId":331080,"journal":{"name":"2012 IEEE International Conference on Communications (ICC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117194474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Design aspects of closed loop beamforming transmit diversity in HSUPA HSUPA中闭环波束形成发射分集的设计
Pub Date : 2012-06-10 DOI: 10.1109/ICC.2012.6364790
Yibo Jiang, J. Hou, A. Bharadwaj, S. Sambhwani
Closed loop beamforming transmit diversity is a promising technique to improve the uplink transmission performance in cellular networks. This technique was recently incorporated into the 3GPP HSPA standard. This paper reflects on several design aspects of closed loop beamforming transmit diversity, including: precoded pilot channels design, precoding information determination when UE is in soft handover, and enhanced symmetric beamforming implementation.
闭环波束形成发射分集是一种很有前途的提高蜂窝网络上行传输性能的技术。该技术最近被纳入3GPP HSPA标准。本文从预编码导频信道设计、终端软切换时的预编码信息确定、增强对称波束形成实现等几个方面对闭环波束形成发射分集设计进行了探讨。
{"title":"Design aspects of closed loop beamforming transmit diversity in HSUPA","authors":"Yibo Jiang, J. Hou, A. Bharadwaj, S. Sambhwani","doi":"10.1109/ICC.2012.6364790","DOIUrl":"https://doi.org/10.1109/ICC.2012.6364790","url":null,"abstract":"Closed loop beamforming transmit diversity is a promising technique to improve the uplink transmission performance in cellular networks. This technique was recently incorporated into the 3GPP HSPA standard. This paper reflects on several design aspects of closed loop beamforming transmit diversity, including: precoded pilot channels design, precoding information determination when UE is in soft handover, and enhanced symmetric beamforming implementation.","PeriodicalId":331080,"journal":{"name":"2012 IEEE International Conference on Communications (ICC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120899150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transmit mode selection schemes for distributed coordinated transmission of data traffic 数据流量分布式协调传输的传输模式选择方案
Pub Date : 2012-06-10 DOI: 10.1109/ICC.2012.6364243
Christian M. Mueller
Coordinated Multi-Point transmission schemes have a large potential to increase spectral efficiency in cellular networks. While the physical layer aspects of coordinated transmission received a lot of attention, its integration into higher layers yet remains to be investigated. In this work, we analyze the transmit mode selection for coordinated and uncoordinated transmission of data traffic. We propose two transmit mode selection schemes to decide whether to use coordinated transmission for an object or not. One scheme is based on object size, the other one is based on queue state. We derive the optimal parameter settings for our selective coordination schemes and show how they improve system performance.
协调多点传输方案在蜂窝网络中具有提高频谱效率的巨大潜力。虽然协调传输的物理层方面得到了很多关注,但其与更高层的整合仍有待研究。在本工作中,我们分析了数据流量的协调传输和非协调传输的传输模式选择。我们提出了两种传输模式选择方案来决定是否对一个对象使用协调传输。一种方案基于对象大小,另一种方案基于队列状态。我们为我们的选择协调方案导出了最优参数设置,并展示了它们如何提高系统性能。
{"title":"Transmit mode selection schemes for distributed coordinated transmission of data traffic","authors":"Christian M. Mueller","doi":"10.1109/ICC.2012.6364243","DOIUrl":"https://doi.org/10.1109/ICC.2012.6364243","url":null,"abstract":"Coordinated Multi-Point transmission schemes have a large potential to increase spectral efficiency in cellular networks. While the physical layer aspects of coordinated transmission received a lot of attention, its integration into higher layers yet remains to be investigated. In this work, we analyze the transmit mode selection for coordinated and uncoordinated transmission of data traffic. We propose two transmit mode selection schemes to decide whether to use coordinated transmission for an object or not. One scheme is based on object size, the other one is based on queue state. We derive the optimal parameter settings for our selective coordination schemes and show how they improve system performance.","PeriodicalId":331080,"journal":{"name":"2012 IEEE International Conference on Communications (ICC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120974560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Outage probability of dual-hop AF opportunistic relaying with directional antennas 定向天线双跳AF机会中继的中断概率
Pub Date : 2012-06-10 DOI: 10.1109/ICC.2012.6363709
A. Behnad, A. M. Rabiei, N. Beaulieu
An exact expression for the outage probability of opportunistic relaying in a dual-hop amplify-and-forward relay network is derived for general fading environments and the case where the source and destination nodes make use of directional antennas. The relaying nodes are assumed to be distributed according to a homogeneous two-dimensional Poisson point process with fixed density. This assumption is of great practical importance as in a typical practical scenario, the number of relays as well as their distances from the source and destination are random. It is observed that under some circumstances, a directional antenna at the source may permit more efficient deployment of the relay network than the case where an omnidirectional antenna is used.
针对一般衰落环境和源节点和目的节点均使用定向天线的情况,导出了双跳放大转发中继网络中机会中继中断概率的精确表达式。假定继电节点按密度固定的二维均匀泊松点过程分布。这一假设具有重要的实际意义,因为在典型的实际情况中,中继的数量以及它们与源和目的地的距离都是随机的。可以观察到,在某些情况下,在源处使用定向天线比在使用全向天线的情况下可以更有效地部署中继网络。
{"title":"Outage probability of dual-hop AF opportunistic relaying with directional antennas","authors":"A. Behnad, A. M. Rabiei, N. Beaulieu","doi":"10.1109/ICC.2012.6363709","DOIUrl":"https://doi.org/10.1109/ICC.2012.6363709","url":null,"abstract":"An exact expression for the outage probability of opportunistic relaying in a dual-hop amplify-and-forward relay network is derived for general fading environments and the case where the source and destination nodes make use of directional antennas. The relaying nodes are assumed to be distributed according to a homogeneous two-dimensional Poisson point process with fixed density. This assumption is of great practical importance as in a typical practical scenario, the number of relays as well as their distances from the source and destination are random. It is observed that under some circumstances, a directional antenna at the source may permit more efficient deployment of the relay network than the case where an omnidirectional antenna is used.","PeriodicalId":331080,"journal":{"name":"2012 IEEE International Conference on Communications (ICC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121315461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Survivability techniques for NG-PONs and FiWi access networks ng - pon和FiWi接入网的生存性技术
Pub Date : 2012-06-10 DOI: 10.1109/ICC.2012.6364982
M. Maier
Survivability will play a more prominent role in emerging high-speed, multichannel, long-reach next-generation passive optical networks (NG-PONs) than it did in conventional PONs. In this paper, we report on some of the most promising NG-PON survivability techniques such as dual homing, hitless protection switching by means of equalization delays, interconnection fibers, protection rings, and meshed PON topologies, including their cost-benefit analysis for different population densities. We pay particular attention to the design of advanced in-service monitoring techniques for fault detection and localization in PON distribution fibers and study the merits of combining partial optical protection with wireless protection for realizing reliable fiber-wireless (FiWi) access networks and exploiting them to improve the survivability of other critical networks such as the future smart grid.
与传统的无源光网络相比,生存性将在新兴的高速、多通道、长程下一代无源光网络(ng- pon)中发挥更加突出的作用。在本文中,我们报告了一些最有前途的NG-PON生存能力技术,如双归巢,通过均衡延迟的无命中保护交换,互连光纤,保护环和网状PON拓扑,包括它们在不同人口密度下的成本效益分析。我们特别注重设计先进的PON分布光纤故障检测和定位的在线监测技术,并研究将部分光保护与无线保护相结合的优点,以实现可靠的光纤无线(FiWi)接入网,并利用它们来提高其他关键网络(如未来智能电网)的生存能力。
{"title":"Survivability techniques for NG-PONs and FiWi access networks","authors":"M. Maier","doi":"10.1109/ICC.2012.6364982","DOIUrl":"https://doi.org/10.1109/ICC.2012.6364982","url":null,"abstract":"Survivability will play a more prominent role in emerging high-speed, multichannel, long-reach next-generation passive optical networks (NG-PONs) than it did in conventional PONs. In this paper, we report on some of the most promising NG-PON survivability techniques such as dual homing, hitless protection switching by means of equalization delays, interconnection fibers, protection rings, and meshed PON topologies, including their cost-benefit analysis for different population densities. We pay particular attention to the design of advanced in-service monitoring techniques for fault detection and localization in PON distribution fibers and study the merits of combining partial optical protection with wireless protection for realizing reliable fiber-wireless (FiWi) access networks and exploiting them to improve the survivability of other critical networks such as the future smart grid.","PeriodicalId":331080,"journal":{"name":"2012 IEEE International Conference on Communications (ICC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127090239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Emergency response in smartphone-based Mobile Ad-Hoc Networks 基于智能手机的移动Ad-Hoc网络应急响应
Pub Date : 2012-06-10 DOI: 10.1109/ICC.2012.6364839
Pramita Mitra, C. Poellabauer
Today's modern mobile devices (e.g., smartphones and tablets) present great potential for building large-scale mobile sensing and information sharing systems which can be highly beneficial to minimize the fatalities of human lives during emergency response. This paper presents a framework, called BREathing rate MONitoring (BREMON) that allows paramedics to monitor the breathing activities of multiple patients at once using their smartphones. BREMON uses the smartphone accelerometer to measure the accelerations during the breathing activities of a patient. These raw acceleration data are then processed to calculate the number of Breaths Per Minute (BPM) and periodically sent to the smartphones used by the paramedics over a multi-hop network. BREMON makes use of an underlying service sharing infrastructure, called SPontaneous Information and Resource sharing InfrasTructure (SPIRIT) that allows mobile devices to share the breathing activity data as services within the infrastructure.
今天的现代移动设备(例如,智能手机和平板电脑)具有建立大规模移动传感和信息共享系统的巨大潜力,这些系统非常有利于在应急反应期间尽量减少人员死亡。这篇论文提出了一个框架,称为呼吸率监测(BREMON),它允许护理人员使用智能手机同时监测多名患者的呼吸活动。BREMON使用智能手机加速度计来测量患者呼吸活动期间的加速度。然后,这些原始加速数据被处理以计算每分钟呼吸次数(BPM),并定期通过多跳网络发送到护理人员使用的智能手机上。BREMON利用底层服务共享基础设施,称为自发信息和资源共享基础设施(SPIRIT),它允许移动设备将呼吸活动数据作为基础设施内的服务共享。
{"title":"Emergency response in smartphone-based Mobile Ad-Hoc Networks","authors":"Pramita Mitra, C. Poellabauer","doi":"10.1109/ICC.2012.6364839","DOIUrl":"https://doi.org/10.1109/ICC.2012.6364839","url":null,"abstract":"Today's modern mobile devices (e.g., smartphones and tablets) present great potential for building large-scale mobile sensing and information sharing systems which can be highly beneficial to minimize the fatalities of human lives during emergency response. This paper presents a framework, called BREathing rate MONitoring (BREMON) that allows paramedics to monitor the breathing activities of multiple patients at once using their smartphones. BREMON uses the smartphone accelerometer to measure the accelerations during the breathing activities of a patient. These raw acceleration data are then processed to calculate the number of Breaths Per Minute (BPM) and periodically sent to the smartphones used by the paramedics over a multi-hop network. BREMON makes use of an underlying service sharing infrastructure, called SPontaneous Information and Resource sharing InfrasTructure (SPIRIT) that allows mobile devices to share the breathing activity data as services within the infrastructure.","PeriodicalId":331080,"journal":{"name":"2012 IEEE International Conference on Communications (ICC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127178144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
A Game-Theoretic approach to connectivity restoration in Wireless Sensor and Actor Networks 基于博弈论的无线传感器和行动者网络连接恢复方法
Pub Date : 2012-06-10 DOI: 10.1109/ICC.2012.6364848
I. Senturk, Sabri Yilmaz, K. Akkaya
Network partitioning can happen due to node failures in Wireless Sensor and Actor Networks (WSANs) that are deployed in inhospitable environments. In case of multiple actor damages, the network can be easily partitioned into several partitions which disrupt the communication among actors. In such a case, the nodes can relocate to re-establish the network connectivity. Such movement, however, should be minimized due to high energy cost for movement. In this paper, we tackle the problem of connectivity restoration in partitioned WSAN with minimized movement overhead by using a Game Theory based heuristic. The idea is based on the comparison of Nash equilibrium of the partitions. Specifically, the nodes staying in the partitions with greater equilibrium will be stationary while the nodes that are in partitions with the less equilibrium are relocated. In this way, partitions become a part of a federated partition and this federation process takes place until reaching the system-wide unique equilibrium. The effectiveness of the approach is evaluated under a variety of conditions and has been shown to be scalable and effective.
由于部署在恶劣环境中的无线传感器和参与者网络(wsan)中的节点故障,可能会发生网络分区。在多个参与者破坏的情况下,网络很容易被分割成几个分区,从而破坏参与者之间的通信。在这种情况下,节点可以重新定位以重新建立网络连接。然而,由于运动的能量消耗高,应该尽量减少这种运动。本文采用基于博弈论的启发式算法,解决了分区无线局域网中移动开销最小的连通性恢复问题。该思想是基于分区纳什均衡的比较。具体来说,在均衡程度较高的分区中的节点将保持不变,而在均衡程度较低的分区中的节点将被重新定位。通过这种方式,分区成为联邦分区的一部分,这个联邦过程一直持续到达到系统范围的唯一平衡。该方法的有效性在各种条件下进行了评估,并已被证明是可扩展和有效的。
{"title":"A Game-Theoretic approach to connectivity restoration in Wireless Sensor and Actor Networks","authors":"I. Senturk, Sabri Yilmaz, K. Akkaya","doi":"10.1109/ICC.2012.6364848","DOIUrl":"https://doi.org/10.1109/ICC.2012.6364848","url":null,"abstract":"Network partitioning can happen due to node failures in Wireless Sensor and Actor Networks (WSANs) that are deployed in inhospitable environments. In case of multiple actor damages, the network can be easily partitioned into several partitions which disrupt the communication among actors. In such a case, the nodes can relocate to re-establish the network connectivity. Such movement, however, should be minimized due to high energy cost for movement. In this paper, we tackle the problem of connectivity restoration in partitioned WSAN with minimized movement overhead by using a Game Theory based heuristic. The idea is based on the comparison of Nash equilibrium of the partitions. Specifically, the nodes staying in the partitions with greater equilibrium will be stationary while the nodes that are in partitions with the less equilibrium are relocated. In this way, partitions become a part of a federated partition and this federation process takes place until reaching the system-wide unique equilibrium. The effectiveness of the approach is evaluated under a variety of conditions and has been shown to be scalable and effective.","PeriodicalId":331080,"journal":{"name":"2012 IEEE International Conference on Communications (ICC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127259203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Interference-based packet recovery for energy saving in Cognitive Radio Networks 认知无线网络中基于干扰的包恢复节能技术
Pub Date : 2012-06-10 DOI: 10.1109/ICC.2012.6364676
Sharhabeel H. Alnabelsi, A. Kamal
In this paper, we propose to recover collided packets between Primary Users (PUs) and Secondary Users (SUs) in Cognitive Radio Networks (CRNs) for two scenarios. When a collision occurs between an SU and a PU transmitters, the SU's receiver considers the PU's transmitted packet's signals as an interference, and hence, cancels its effect in order to recover its corresponding received packet's signals. Recovering collided packets, instead of retransmitting them saves transmitters' energy. In the first scenario, we assume PUs and SUs employ the standard Binary Phase-Shift keying (BPSK) and a 90 degree phase shifted version, i.e., orthogonal to BPSK, respectively, as their modulation techniques. In the Second scenario, we assume PUs and SUs employ BPSK and QPSK as their modulation techniques, respectively, or vice versa. In both scenarios, we propose protocols to recover the SU collided packets, depending on the received phase shifts. We show through numerical analysis that a significant fraction of collided packets can be recovered. We also derive an energy saving performance metric for our proposed mechanisms, in order to assess the saved energy due to recovering the collided packets. Our numerical analysis also shows that a high percentage of energy can be saved over the traditional scheme, in which our packets recovery mechanisms are not employed.
在本文中,我们提出了在认知无线网络(crn)中恢复主用户(pu)和从用户(su)之间的碰撞数据包的两种方案。当一个SU与一个PU的发射器发生碰撞时,SU的接收器将PU发送的数据包信号视为干扰,从而消除其影响,以恢复其接收到的相应数据包信号。恢复碰撞的数据包,而不是重新传输它们,节省了发送器的能量。在第一种情况下,我们假设pu和su采用标准的二进制相移键控(BPSK)和90度相移版本,即分别与BPSK正交,作为它们的调制技术。在第二种情况下,我们假设pu和su分别采用BPSK和QPSK作为它们的调制技术,反之亦然。在这两种情况下,我们都根据接收到的相移提出了恢复SU碰撞数据包的协议。我们通过数值分析表明,可以恢复相当一部分碰撞数据包。我们还为我们提出的机制导出了一个节能性能指标,以评估由于恢复碰撞数据包而节省的能量。我们的数值分析还表明,在不使用我们的数据包恢复机制的传统方案中,可以节省高比例的能量。
{"title":"Interference-based packet recovery for energy saving in Cognitive Radio Networks","authors":"Sharhabeel H. Alnabelsi, A. Kamal","doi":"10.1109/ICC.2012.6364676","DOIUrl":"https://doi.org/10.1109/ICC.2012.6364676","url":null,"abstract":"In this paper, we propose to recover collided packets between Primary Users (PUs) and Secondary Users (SUs) in Cognitive Radio Networks (CRNs) for two scenarios. When a collision occurs between an SU and a PU transmitters, the SU's receiver considers the PU's transmitted packet's signals as an interference, and hence, cancels its effect in order to recover its corresponding received packet's signals. Recovering collided packets, instead of retransmitting them saves transmitters' energy. In the first scenario, we assume PUs and SUs employ the standard Binary Phase-Shift keying (BPSK) and a 90 degree phase shifted version, i.e., orthogonal to BPSK, respectively, as their modulation techniques. In the Second scenario, we assume PUs and SUs employ BPSK and QPSK as their modulation techniques, respectively, or vice versa. In both scenarios, we propose protocols to recover the SU collided packets, depending on the received phase shifts. We show through numerical analysis that a significant fraction of collided packets can be recovered. We also derive an energy saving performance metric for our proposed mechanisms, in order to assess the saved energy due to recovering the collided packets. Our numerical analysis also shows that a high percentage of energy can be saved over the traditional scheme, in which our packets recovery mechanisms are not employed.","PeriodicalId":331080,"journal":{"name":"2012 IEEE International Conference on Communications (ICC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127472575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2012 IEEE International Conference on Communications (ICC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1