首页 > 最新文献

2010 International Conference on Wireless Information Networks and Systems (WINSYS)最新文献

英文 中文
Cooperative approach to self-managed VANETs 以合作方式实现自我管理的VANETs
J. Molina-Gil, C. Caballero-Gil, P. Caballero-Gil
Vehicular networks are becoming more and more important in our society because of the great benefits that can be obtained from them. Most research contributions propose specific mechanisms where the presence of a Certification Authority is necessary, which implies a centralized system in charge of certification and revocation services. In our work we propose a more realistic view of what will be the beginning of these networks, where privacy and integrity are required and where misbehaving or faulty nodes have to be detected and prevented from disrupting the network operation in a self-organized way.
车联网在我们的社会中变得越来越重要,因为它可以从中获得巨大的利益。大多数研究贡献都提出了需要一个证书颁发机构的具体机制,这意味着一个负责证书和撤销服务的集中系统。在我们的工作中,我们提出了一个更现实的观点,即这些网络的开端是什么,其中需要隐私和完整性,并且必须检测到行为不端或有故障的节点,并防止其以自组织的方式破坏网络运行。
{"title":"Cooperative approach to self-managed VANETs","authors":"J. Molina-Gil, C. Caballero-Gil, P. Caballero-Gil","doi":"10.5220/0002991600940097","DOIUrl":"https://doi.org/10.5220/0002991600940097","url":null,"abstract":"Vehicular networks are becoming more and more important in our society because of the great benefits that can be obtained from them. Most research contributions propose specific mechanisms where the presence of a Certification Authority is necessary, which implies a centralized system in charge of certification and revocation services. In our work we propose a more realistic view of what will be the beginning of these networks, where privacy and integrity are required and where misbehaving or faulty nodes have to be detected and prevented from disrupting the network operation in a self-organized way.","PeriodicalId":332730,"journal":{"name":"2010 International Conference on Wireless Information Networks and Systems (WINSYS)","volume":"112 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114025465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Partial feedback multi-user scheduling in multi-antenna systems 多天线系统中的部分反馈多用户调度
A. Salim
In this paper we consider the greedy scheduling algorithm that routes transmission of users' packets based on their reported CSI in the uplink channel to the user with the best instantaneous channel conditions. We propose a scheduling scheme that relies on reporting partial feedback of the CSI. We compare the proposed scheme to the one that uses perfect channel information at the base station, we will see that the proposed scheme has significantly less complexity at the expense of a loss in the system's capacity.
本文考虑了一种贪婪调度算法,该算法根据用户在上行信道上的报告CSI,将数据包的传输路由到具有最佳瞬时信道条件的用户。我们提出了一种基于报告CSI部分反馈的调度方案。我们将所提出的方案与在基站中使用完美信道信息的方案进行比较,我们将看到,所提出的方案以系统容量损失为代价,显著降低了复杂性。
{"title":"Partial feedback multi-user scheduling in multi-antenna systems","authors":"A. Salim","doi":"10.5220/0002966401570160","DOIUrl":"https://doi.org/10.5220/0002966401570160","url":null,"abstract":"In this paper we consider the greedy scheduling algorithm that routes transmission of users' packets based on their reported CSI in the uplink channel to the user with the best instantaneous channel conditions. We propose a scheduling scheme that relies on reporting partial feedback of the CSI. We compare the proposed scheme to the one that uses perfect channel information at the base station, we will see that the proposed scheme has significantly less complexity at the expense of a loss in the system's capacity.","PeriodicalId":332730,"journal":{"name":"2010 International Conference on Wireless Information Networks and Systems (WINSYS)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121609537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QoS scheduling for IEEE 802.16e mesh mode using Genetic Algorithms 基于遗传算法的IEEE 802.16e mesh模式QoS调度
N. Krichene, N. Boudriga
IEEE 802.16e amendments for the mesh mode do not specify particular QoS mechanisms. However, each Mesh Subscriber Station (MSS) transmits its own traffic and forwards the traffic of its children while each traffic flow has its particular QoS constraints. As all forwarded traffics use the same link, one MSS may experience starvation or act selfishly. Besides, the MSS's mobility adds important complexity as all the affected flows need to be re-routed, re-admitted and re-scheduled while respecting their original QoS requirements. In this paper, we adopt the concept of assigning five virtual nodes to each MSS reflecting the five QoS classes of IEEE 802.16e and we propose scheduling the uplink transmissions of the real-time Polling Service (rtPS) traffic class by adopting the Genetic Algorithms concept. We define the priority assigner component which communicates with the scheduler of the mesh BS in order to set and update flows' priority and we optimize the time spent by a flow in the queue while implementing the mobility constraints within the mutation function.
针对mesh模式的IEEE 802.16e修订没有指定特定的QoS机制。然而,每个Mesh Subscriber Station (MSS)传输自己的业务并转发其子业务,而每个业务流都有其特定的QoS约束。由于所有转发的流量都使用同一链路,因此一个MSS可能会遇到饥饿或自私的行为。此外,MSS的移动性增加了重要的复杂性,因为所有受影响的流需要在尊重其原始QoS需求的同时重新路由、重新接收和重新调度。在本文中,我们采用了为每个MSS分配5个虚拟节点的概念,反映了IEEE 802.16e的5个QoS类,我们提出了采用遗传算法的概念来调度实时轮询服务(rtPS)流量类的上行传输。我们定义了优先级分配器组件,该组件与mesh BS的调度程序通信,以设置和更新流的优先级,并优化了流在队列中花费的时间,同时在突变函数中实现了移动性约束。
{"title":"QoS scheduling for IEEE 802.16e mesh mode using Genetic Algorithms","authors":"N. Krichene, N. Boudriga","doi":"10.5220/0002916900050012","DOIUrl":"https://doi.org/10.5220/0002916900050012","url":null,"abstract":"IEEE 802.16e amendments for the mesh mode do not specify particular QoS mechanisms. However, each Mesh Subscriber Station (MSS) transmits its own traffic and forwards the traffic of its children while each traffic flow has its particular QoS constraints. As all forwarded traffics use the same link, one MSS may experience starvation or act selfishly. Besides, the MSS's mobility adds important complexity as all the affected flows need to be re-routed, re-admitted and re-scheduled while respecting their original QoS requirements. In this paper, we adopt the concept of assigning five virtual nodes to each MSS reflecting the five QoS classes of IEEE 802.16e and we propose scheduling the uplink transmissions of the real-time Polling Service (rtPS) traffic class by adopting the Genetic Algorithms concept. We define the priority assigner component which communicates with the scheduler of the mesh BS in order to set and update flows' priority and we optimize the time spent by a flow in the queue while implementing the mobility constraints within the mutation function.","PeriodicalId":332730,"journal":{"name":"2010 International Conference on Wireless Information Networks and Systems (WINSYS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114626145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic context detection of a mobile user 移动用户的自动上下文检测
Uta Christoph, Karl-Heinz Krempels, Janno von Stülpnagel, Christoph Terwelp
Mobile devices have obtained a significant role in our life providing a large variety of useful functionalities and features. It is desirable to have an automated adaptation of the behavior of a mobile device depending on a change of user context to fulfill expectations towards practical usefulness. To enable mobile devices to adapt their behavior automatically there is a need to determine the mobile user's context. In this paper we introduce an integrated approach for the automatic detection of a user's context. Therefore, we summarize and discuss existing approaches and technologies and describe a service architecture that takes into account information from the interaction of the mobile device with communication networks and positioning systems, from integrated sensors, and planned behavior of the user from e.g his calendar or activity list. Additionally it considers the social network of the user to derive further information about his context and finally it takes into account his customs through a behavior model.
移动设备在我们的生活中扮演着重要的角色,它提供了大量有用的功能和特性。希望能够根据用户上下文的变化对移动设备的行为进行自动调整,以实现对实际有用性的期望。为了使移动设备能够自动调整其行为,需要确定移动用户的上下文。本文介绍了一种用于自动检测用户上下文的集成方法。因此,我们总结和讨论了现有的方法和技术,并描述了一种服务架构,该架构考虑了来自移动设备与通信网络和定位系统的交互信息,来自集成传感器的信息,以及来自用户的计划行为,例如他的日历或活动列表。此外,它考虑了用户的社会网络,以获得有关其上下文的进一步信息,最后通过行为模型考虑了他的习惯。
{"title":"Automatic context detection of a mobile user","authors":"Uta Christoph, Karl-Heinz Krempels, Janno von Stülpnagel, Christoph Terwelp","doi":"10.5220/0003030701890194","DOIUrl":"https://doi.org/10.5220/0003030701890194","url":null,"abstract":"Mobile devices have obtained a significant role in our life providing a large variety of useful functionalities and features. It is desirable to have an automated adaptation of the behavior of a mobile device depending on a change of user context to fulfill expectations towards practical usefulness. To enable mobile devices to adapt their behavior automatically there is a need to determine the mobile user's context. In this paper we introduce an integrated approach for the automatic detection of a user's context. Therefore, we summarize and discuss existing approaches and technologies and describe a service architecture that takes into account information from the interaction of the mobile device with communication networks and positioning systems, from integrated sensors, and planned behavior of the user from e.g his calendar or activity list. Additionally it considers the social network of the user to derive further information about his context and finally it takes into account his customs through a behavior model.","PeriodicalId":332730,"journal":{"name":"2010 International Conference on Wireless Information Networks and Systems (WINSYS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114747527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Experimental performance evaluation of a Gbps FSO link: A case study Gbps FSO链路的实验性能评估:一个案例研究
J. P. Carvalho, N. Marques, H. Veiga, C. Pacheco, A. Reis
Wireless communications have been increasingly important. Besides Wi-Fi, FSO plays a very relevant technological role in this context. Performance is essential, resulting in more reliable and efficient communications. A FSO medium range link has been successfully implemented for high requirement applications at Gbps. An experimental performance evaluation of this link has been carried out at OSI layers 1, 4 and 7, through a specifically planned field test arrangement. Several results are presented and discussed, as obtained from simultaneous measurements of powers received by the laser heads, TCP, UDP and FTP experiments, resulting in determinations of TCP throughput, jitter, percentage datagram loss and FTP transfer rate. Conclusions are drawn about link performance.
无线通信变得越来越重要。除了Wi-Fi之外,FSO在这方面也扮演着非常相关的技术角色。性能至关重要,从而实现更可靠和高效的通信。FSO中距离链路已成功实现,适用于Gbps的高要求应用。通过特别计划的现场测试安排,在OSI第1、4和7层对这一链路进行了实验性性能评价。通过同时测量激光头接收功率、TCP、UDP和FTP实验,给出并讨论了TCP吞吐量、抖动、数据报丢失百分比和FTP传输速率的几个结果。得出了有关链路性能的结论。
{"title":"Experimental performance evaluation of a Gbps FSO link: A case study","authors":"J. P. Carvalho, N. Marques, H. Veiga, C. Pacheco, A. Reis","doi":"10.5220/0002978601230128","DOIUrl":"https://doi.org/10.5220/0002978601230128","url":null,"abstract":"Wireless communications have been increasingly important. Besides Wi-Fi, FSO plays a very relevant technological role in this context. Performance is essential, resulting in more reliable and efficient communications. A FSO medium range link has been successfully implemented for high requirement applications at Gbps. An experimental performance evaluation of this link has been carried out at OSI layers 1, 4 and 7, through a specifically planned field test arrangement. Several results are presented and discussed, as obtained from simultaneous measurements of powers received by the laser heads, TCP, UDP and FTP experiments, resulting in determinations of TCP throughput, jitter, percentage datagram loss and FTP transfer rate. Conclusions are drawn about link performance.","PeriodicalId":332730,"journal":{"name":"2010 International Conference on Wireless Information Networks and Systems (WINSYS)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133526991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A resource discovery strategy for mobile Peer-to-Peer networks 移动对等网络的资源发现策略
Hao Wu, Chao-Chung Cheng, Z. Zhong
Resource discovery is one of the key issues in mobile P2P studies. Nonetheless, in existing schemes thereare still some deficiencies, such as the lake of flexibility, proportionality and adaptability. In this paper, we present a resource discovery model Mobile-Tapestry (M-Tapestry) for mobile P2P networks based on the P2P Tapestry strategy. The philosophy of this model is to make the network architecture layered, and only a small number of super nodes are chosen instead of all nodes to access the Tapestry system. This measure may reduce the cost of ordinary nodes and solve the reliability problems caused, when the routing table is updated frequently. Additionally, we partition the nodes according to their geographical location, this may avoid the problem that the distance between the nodes having adjacent IDs is actually large due to the Hash operation. Finally, our simulation results and analysis shows that the M-Tapestry strategy has an improved lookup efficiency for mobile P2P networks compared to the Tapestry strategy.
资源发现是移动P2P研究的关键问题之一。然而,现有的方案还存在一些不足,如缺乏灵活性、比例性和适应性。本文提出了一种基于P2P Tapestry策略的移动P2P网络资源发现模型mobile -Tapestry (M-Tapestry)。该模型的原理是使网络体系结构分层,并且只选择少数超级节点而不是所有节点来访问Tapestry系统。该措施可以降低普通节点的开销,解决路由表频繁更新带来的可靠性问题。此外,我们根据节点的地理位置对节点进行分区,这可以避免由于哈希操作而导致具有相邻id的节点之间的距离实际上很大的问题。最后,我们的仿真结果和分析表明,与Tapestry策略相比,M-Tapestry策略在移动P2P网络中具有更高的查找效率。
{"title":"A resource discovery strategy for mobile Peer-to-Peer networks","authors":"Hao Wu, Chao-Chung Cheng, Z. Zhong","doi":"10.5220/0002987200420046","DOIUrl":"https://doi.org/10.5220/0002987200420046","url":null,"abstract":"Resource discovery is one of the key issues in mobile P2P studies. Nonetheless, in existing schemes thereare still some deficiencies, such as the lake of flexibility, proportionality and adaptability. In this paper, we present a resource discovery model Mobile-Tapestry (M-Tapestry) for mobile P2P networks based on the P2P Tapestry strategy. The philosophy of this model is to make the network architecture layered, and only a small number of super nodes are chosen instead of all nodes to access the Tapestry system. This measure may reduce the cost of ordinary nodes and solve the reliability problems caused, when the routing table is updated frequently. Additionally, we partition the nodes according to their geographical location, this may avoid the problem that the distance between the nodes having adjacent IDs is actually large due to the Hash operation. Finally, our simulation results and analysis shows that the M-Tapestry strategy has an improved lookup efficiency for mobile P2P networks compared to the Tapestry strategy.","PeriodicalId":332730,"journal":{"name":"2010 International Conference on Wireless Information Networks and Systems (WINSYS)","volume":"718 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116128519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Network layer based secure routing protocol for wireless ad hoc sensor networks in urban environments 基于网络层的城市无线自组织传感器网络安全路由协议
S. K. Dhurandher, M. Obaidat, Deepank Gupta, Nidhi Gupta, Anupriya Asthana
Security is essential in wireless sensor networks as they are being used in urban environments, life saving disaster management and rescue operations. Any serious attack at the routing layer can cause serious damages. Although a lot of security measures have been proposed for application and transport layer, we have found that there is not enough research geared towards securing the network at the routing layer. In this paper, we propose a novel solution for securing against external as well as internal attacks. The protocol maintains a working network by using redundant multiple paths despite attacks at one route. It also identifies and removes the malicious nodes from the system. Since the system is totally distributed and does not require a central server as required in some of the other protocols, there is no single point of failure. We also keep in mind the limited computing resources and network bandwidth of the wireless sensor nodes. Finally the paper quantifies the protocol's effectiveness against some of the existing secure routing protocols namely QDV and SNEP using simulation studies.
在城市环境、救生灾害管理和救援行动中使用无线传感器网络时,安全性至关重要。任何对路由层的严重攻击都可能造成严重的破坏。尽管针对应用层和传输层提出了许多安全措施,但我们发现针对路由层的网络安全研究还不够。在本文中,我们提出了一种新的解决方案,以防止外部和内部攻击。该协议通过使用冗余的多路径来维持一个正常的网络,尽管在一条路由上受到攻击。它还可以识别并从系统中删除恶意节点。由于该系统是完全分布式的,不像其他一些协议那样需要中央服务器,因此不存在单点故障。我们还考虑到无线传感器节点有限的计算资源和网络带宽。最后,通过仿真研究,量化了该协议相对于现有安全路由协议(QDV和SNEP)的有效性。
{"title":"Network layer based secure routing protocol for wireless ad hoc sensor networks in urban environments","authors":"S. K. Dhurandher, M. Obaidat, Deepank Gupta, Nidhi Gupta, Anupriya Asthana","doi":"10.5220/0003105100230028","DOIUrl":"https://doi.org/10.5220/0003105100230028","url":null,"abstract":"Security is essential in wireless sensor networks as they are being used in urban environments, life saving disaster management and rescue operations. Any serious attack at the routing layer can cause serious damages. Although a lot of security measures have been proposed for application and transport layer, we have found that there is not enough research geared towards securing the network at the routing layer. In this paper, we propose a novel solution for securing against external as well as internal attacks. The protocol maintains a working network by using redundant multiple paths despite attacks at one route. It also identifies and removes the malicious nodes from the system. Since the system is totally distributed and does not require a central server as required in some of the other protocols, there is no single point of failure. We also keep in mind the limited computing resources and network bandwidth of the wireless sensor nodes. Finally the paper quantifies the protocol's effectiveness against some of the existing secure routing protocols namely QDV and SNEP using simulation studies.","PeriodicalId":332730,"journal":{"name":"2010 International Conference on Wireless Information Networks and Systems (WINSYS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124804885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Formal specification and verification of the OMA license choice algorithm in the OTS/CafeOBJ method OTS/CafeOBJ方法中OMA许可证选择算法的形式化规范和验证
Nikolaos Triantafyllou, Iakovos Ouranos, P. Stefaneas, P. Frangos
OMA-Digital Rights Management System is a standard proposed by the Open Mobile Alliance (OMA) for protecting digital content distribution via mobile networks. To solve the decision problem, in the case that multiple licenses refer to the same content, OMA suggests a license choice algorithm. This algorithm ensures the fine grained consumption of contents. CafeOBJ is a new generation algebraic specification language. We apply the OTS/CafeOBJ method to formally model, specify and verify the above mentioned license choice algorithm. More specifically, we develop the mathematical model of the OMA decision algorithm as an OTS, a kind of transition system expressed in an equational CafeOBJ specification style. Finally, we verify that this algorithm fulfills the following safety property: Whenever a license is chosen for a given content, then the license is valid at that specific time.
OMA-数字版权管理系统是由开放移动联盟(OMA)提出的一项标准,用于保护通过移动网络分发的数字内容。为了解决决策问题,在多个许可证引用相同内容的情况下,OMA提出了一个许可证选择算法。该算法确保了内容的细粒度消费。CafeOBJ是新一代代数规范语言。我们采用OTS/CafeOBJ方法对上述许可选择算法进行形式化建模、具体化和验证。更具体地说,我们将OMA决策算法的数学模型发展为OTS,这是一种用方程CafeOBJ规范风格表示的转换系统。最后,我们验证此算法是否满足以下安全属性:每当为给定内容选择许可时,则该许可在该特定时间有效。
{"title":"Formal specification and verification of the OMA license choice algorithm in the OTS/CafeOBJ method","authors":"Nikolaos Triantafyllou, Iakovos Ouranos, P. Stefaneas, P. Frangos","doi":"10.5220/0002944501730180","DOIUrl":"https://doi.org/10.5220/0002944501730180","url":null,"abstract":"OMA-Digital Rights Management System is a standard proposed by the Open Mobile Alliance (OMA) for protecting digital content distribution via mobile networks. To solve the decision problem, in the case that multiple licenses refer to the same content, OMA suggests a license choice algorithm. This algorithm ensures the fine grained consumption of contents. CafeOBJ is a new generation algebraic specification language. We apply the OTS/CafeOBJ method to formally model, specify and verify the above mentioned license choice algorithm. More specifically, we develop the mathematical model of the OMA decision algorithm as an OTS, a kind of transition system expressed in an equational CafeOBJ specification style. Finally, we verify that this algorithm fulfills the following safety property: Whenever a license is chosen for a given content, then the license is valid at that specific time.","PeriodicalId":332730,"journal":{"name":"2010 International Conference on Wireless Information Networks and Systems (WINSYS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124279737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
ANOVA-based RF DNA analysis: Identifying significant parameters for device classification 基于方差分析的射频DNA分析:识别设备分类的重要参数
Kevin S. Kuciapinski, M. Temple, R. W. Klein
Analysis of variance (ANOVA) is applied to RF DNA fingerprinting techniques to ascertain the most significant signal characteristics that can be used to form robust statistical fingerprint features. The goal is to find features that enable reliable identification of like-model communication devices having different serial numbers. Once achieved, these unique physical layer identities can be used to augment existing bit-level protection mechanisms and overall network security is improved. ANOVA experimentation is generated using a subset of collected signal characteristics (amplitude, phase, frequency, signal-to-noise ratio, etc.) and post-collection processing parameters (bandwidth, fingerprint regions, statistical features, etc.). The ANOVA input is percent correct device classification as obtained from MDA/ML discrimination using three like-model devices from a given manufacturer. Full factorial design experiments and ANOVA are used to determine the significance of individual parameters, and interactions thereof, in achieving higher percentages of correct classification. ANOVA is shown to be well-suited for the task and reveals parametric interactions that are otherwise unobservable using conventional graphical and tabular data representations.
方差分析(ANOVA)应用于射频DNA指纹识别技术,以确定最显著的信号特征,可用于形成稳健的统计指纹特征。目标是找到能够可靠地识别具有不同序列号的同类通信设备的特性。一旦实现,这些独特的物理层身份可以用来增强现有的位级保护机制,并提高整体网络安全性。利用采集到的信号特征(幅度、相位、频率、信噪比等)和采集后处理参数(带宽、指纹区域、统计特征等)的子集生成方差分析实验。方差分析输入是使用来自给定制造商的三个相似模型设备从MDA/ML判别中获得的设备分类的正确百分比。全因子设计实验和方差分析用于确定个体参数及其相互作用的显著性,以获得更高的正确分类百分比。方差分析被证明非常适合这项任务,并揭示了使用传统的图形和表格数据表示无法观察到的参数交互。
{"title":"ANOVA-based RF DNA analysis: Identifying significant parameters for device classification","authors":"Kevin S. Kuciapinski, M. Temple, R. W. Klein","doi":"10.5220/0002994100470052","DOIUrl":"https://doi.org/10.5220/0002994100470052","url":null,"abstract":"Analysis of variance (ANOVA) is applied to RF DNA fingerprinting techniques to ascertain the most significant signal characteristics that can be used to form robust statistical fingerprint features. The goal is to find features that enable reliable identification of like-model communication devices having different serial numbers. Once achieved, these unique physical layer identities can be used to augment existing bit-level protection mechanisms and overall network security is improved. ANOVA experimentation is generated using a subset of collected signal characteristics (amplitude, phase, frequency, signal-to-noise ratio, etc.) and post-collection processing parameters (bandwidth, fingerprint regions, statistical features, etc.). The ANOVA input is percent correct device classification as obtained from MDA/ML discrimination using three like-model devices from a given manufacturer. Full factorial design experiments and ANOVA are used to determine the significance of individual parameters, and interactions thereof, in achieving higher percentages of correct classification. ANOVA is shown to be well-suited for the task and reveals parametric interactions that are otherwise unobservable using conventional graphical and tabular data representations.","PeriodicalId":332730,"journal":{"name":"2010 International Conference on Wireless Information Networks and Systems (WINSYS)","volume":"22 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128830518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Planning of a broadband wireless network based in OFDM: General considerations 基于OFDM的宽带无线网络规划:一般考虑
Benigno Rodríguez
In this paper several hints to be considered in the design of a commercial broadband wireless network are pre-sented. The case of study is based in Worldwide Interoperability for Microwave Access (WiMAX) networks, but the general concepts are also valid for Long Term Evolution (LTE). The information presented here is not only valid for the task of designing a broadband wireless network, but also it can be useful to focus research in the economically most sensitive areas.
本文提出了商用宽带无线网络设计中应考虑的几个问题。研究案例是基于微波接入(WiMAX)网络的全球互操作性,但一般概念也适用于长期演进(LTE)。本文所提供的信息不仅对设计宽带无线网络的任务有效,而且对集中研究经济上最敏感的领域也有帮助。
{"title":"Planning of a broadband wireless network based in OFDM: General considerations","authors":"Benigno Rodríguez","doi":"10.5220/0002912100550060","DOIUrl":"https://doi.org/10.5220/0002912100550060","url":null,"abstract":"In this paper several hints to be considered in the design of a commercial broadband wireless network are pre-sented. The case of study is based in Worldwide Interoperability for Microwave Access (WiMAX) networks, but the general concepts are also valid for Long Term Evolution (LTE). The information presented here is not only valid for the task of designing a broadband wireless network, but also it can be useful to focus research in the economically most sensitive areas.","PeriodicalId":332730,"journal":{"name":"2010 International Conference on Wireless Information Networks and Systems (WINSYS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132145833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2010 International Conference on Wireless Information Networks and Systems (WINSYS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1