首页 > 最新文献

2016 International Conference on Computer, Information and Telecommunication Systems (CITS)最新文献

英文 中文
Detecting first-order leakages against the tower field masking scheme 根据塔场掩蔽方案检测一阶泄漏
Miao Yuan, Guoqiang Bai
A variety of masking schemes have been introduced to protect the block cipher. The critical technology lies on how to implement the nonlinear part with minimal resources. One popular way to solve this problem is using tower field representation. However, this idea always need two variables as inputs for conversion, which may result in suspicious first-order leakages during this operation. In this paper, we apply first-order attacks against variables of the conversion part based on simulation experiments to prove our speculation. The simulation results show that our proposed idea is more efficient than the second-order attacks in the noisy scenario.
为了保护分组密码,引入了多种掩蔽方案。关键技术在于如何以最小的资源实现非线性部分。解决这个问题的一个流行方法是使用塔字段表示。然而,这种想法总是需要两个变量作为转换的输入,这可能导致在此操作期间可疑的一阶泄漏。本文在仿真实验的基础上,对转换部分的变量采用一阶攻击来证明我们的推测。仿真结果表明,在有噪声的情况下,该方法比二阶攻击更有效。
{"title":"Detecting first-order leakages against the tower field masking scheme","authors":"Miao Yuan, Guoqiang Bai","doi":"10.1109/CITS.2016.7546450","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546450","url":null,"abstract":"A variety of masking schemes have been introduced to protect the block cipher. The critical technology lies on how to implement the nonlinear part with minimal resources. One popular way to solve this problem is using tower field representation. However, this idea always need two variables as inputs for conversion, which may result in suspicious first-order leakages during this operation. In this paper, we apply first-order attacks against variables of the conversion part based on simulation experiments to prove our speculation. The simulation results show that our proposed idea is more efficient than the second-order attacks in the noisy scenario.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128709249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Min-Actor algorithm for connected dominating set formation in WSAN WSAN中连通控制集形成的最小-参与者算法
Yun Zhang, Yu Guo, Zhenqiang Mi, Yang Yang, M. Obaidat
As the virtual backbone of the network, connected dominating set (CDS) plays an important role in supporting data communication, reducing the routing overhead, and enhancing the scalability of the network. Traditional CDS construction algorithms are usually applied to the networks with homogeneous nodes, e.g., a pure wireless sensor network. In the past few years, Wireless Sensor and Actor Networks (WSANs) have attracted growing attentions due to its capabilities of sensing and gathering information, as well as performing certain tasks by actor nodes. One of the most critical issues in WSAN is how to construct an appropriate CDS with the consideration of heterogeneous nodes. Specifically, how to construct the CDS that contains minimum number of actors, so that the movement of actors poses a minimal threat to the integrity of the CDS. In this paper, we take the nature of the actor nodes into consideration and propose a CDS construction algorithm named Min-Actor algorithm (MIA), which can reduce nodes' movement constraints in WSAN. Simulation results confirm that MIA can effectively reduce the number of the actors in CDS, thus reducing the impact of actors' movement on the network.
连接支配集(CDS)作为网络的虚拟骨干,在支持数据通信、减少路由开销、增强网络的可扩展性等方面发挥着重要作用。传统的CDS构建算法通常应用于具有同构节点的网络,例如纯无线传感器网络。在过去的几年里,无线传感器和行动者网络(wsan)由于其感知和收集信息的能力以及行动者节点执行某些任务的能力而受到越来越多的关注。如何在考虑异构节点的情况下构建合适的CDS是WSAN中最关键的问题之一。具体来说,就是如何构建参与者数量最少的CDS,使参与者的移动对CDS完整性的威胁降到最低。本文考虑到参与者节点的性质,提出了一种名为Min-Actor算法(MIA)的CDS构建算法,该算法可以减少WSAN中节点的移动约束。仿真结果证实,MIA可以有效地减少CDS中参与者的数量,从而减少参与者移动对网络的影响。
{"title":"A Min-Actor algorithm for connected dominating set formation in WSAN","authors":"Yun Zhang, Yu Guo, Zhenqiang Mi, Yang Yang, M. Obaidat","doi":"10.1109/CITS.2016.7546411","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546411","url":null,"abstract":"As the virtual backbone of the network, connected dominating set (CDS) plays an important role in supporting data communication, reducing the routing overhead, and enhancing the scalability of the network. Traditional CDS construction algorithms are usually applied to the networks with homogeneous nodes, e.g., a pure wireless sensor network. In the past few years, Wireless Sensor and Actor Networks (WSANs) have attracted growing attentions due to its capabilities of sensing and gathering information, as well as performing certain tasks by actor nodes. One of the most critical issues in WSAN is how to construct an appropriate CDS with the consideration of heterogeneous nodes. Specifically, how to construct the CDS that contains minimum number of actors, so that the movement of actors poses a minimal threat to the integrity of the CDS. In this paper, we take the nature of the actor nodes into consideration and propose a CDS construction algorithm named Min-Actor algorithm (MIA), which can reduce nodes' movement constraints in WSAN. Simulation results confirm that MIA can effectively reduce the number of the actors in CDS, thus reducing the impact of actors' movement on the network.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116864725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on mobile network traffic taxonomy 移动网络流量分类研究
Z. Liu, Ruoyu Wang, Deyu Tang
A huge amount of mobile traffic runs on Internet every day. The complex mobile traffic data may degrade the network performance if they are not well managed. As the important foundation of network management, mobile network traffic classification aim to map IP packets into a predefined traffic class set. Most work in this area until now has focused on classification schemes. In contrast, little attention has been paid towards traffic class definition. Various kinds of traffic class lead to difficultly comparing these traffic classification methods. This paper presents a mobile traffic taxonomy based on ontology paradigm. Its meta-characteristic is the mobile traffic communication from users' perspective. It defines mobile network traffic into four levels of categories. And the taxonomy could be used for multiple traffic classification purposes.
每天都有大量的移动流量在互联网上运行。复杂的移动流量数据如果管理不好,可能会导致网络性能下降。移动网络流分类是网络管理的重要基础,其目的是将IP报文映射到预定义的流分类集中。到目前为止,该领域的大部分工作都集中在分类方案上。相比之下,很少有人关注流量类的定义。由于流分类种类繁多,导致这些流分类方法难以进行比较。提出了一种基于本体范式的移动流量分类方法。其元特征是用户视角下的移动流量传播。它将移动网络流量分为四个级别。该分类法可用于多种流量分类目的。
{"title":"Research on mobile network traffic taxonomy","authors":"Z. Liu, Ruoyu Wang, Deyu Tang","doi":"10.1109/CITS.2016.7546389","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546389","url":null,"abstract":"A huge amount of mobile traffic runs on Internet every day. The complex mobile traffic data may degrade the network performance if they are not well managed. As the important foundation of network management, mobile network traffic classification aim to map IP packets into a predefined traffic class set. Most work in this area until now has focused on classification schemes. In contrast, little attention has been paid towards traffic class definition. Various kinds of traffic class lead to difficultly comparing these traffic classification methods. This paper presents a mobile traffic taxonomy based on ontology paradigm. Its meta-characteristic is the mobile traffic communication from users' perspective. It defines mobile network traffic into four levels of categories. And the taxonomy could be used for multiple traffic classification purposes.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124439065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A temporal self-organizing neural network for adaptive sub-sequence clustering and case studies 自适应子序列聚类的时间自组织神经网络及其实例研究
Dong Wang, Yanfang Long, Zhu Xiao, Zhiyang Xiang, Wenjie Chen
Temporal neural networks such as Temporal Kohonen Map (TKM) and Recurrent Self-Organizing Map (RSOM) are popular for their incremental and explicit learning abilities. However, for sub-sequence clustering TKM and RSOM may generate many fragments whose classification membership is hard to decide. Besides they have stability issues in multivariate time series processing because they model the historical neuron activities on each variable independently. To overcome the drawbacks, we propose an adaptive sub-sequence clustering method based on single layered Self-Organizing Incremental Neural Network (SOINN). A recurrent filter is proposed to model the quantizations of neuron activations each as a scalar instead of a vector like in TKM and RSOM. Then it is integrated with the single layered SOINN for adaptive clustering where fragmented clusters in TKM and RSOM is replaced by a smoothed clustering result. Experiments are carried out on two datasets, namely a traffic flow dataset from open Caltrans performance measurement systems and a part of the KDD Cup 99 intrusion detection dataset. Experimental results show that the proposed method outperforms the conventional methods by 21.3% and 9.1% on the two datasets respectively.
时间神经网络如时间Kohonen Map (TKM)和递归自组织Map (RSOM)因其增量式和显式学习能力而广受欢迎。然而,对于子序列聚类,TKM和RSOM可能会产生许多难以确定分类隶属的片段。此外,它们在多变量时间序列处理中存在稳定性问题,因为它们独立地对每个变量的历史神经元活动进行建模。为了克服这种缺点,提出了一种基于单层自组织增量神经网络(SOINN)的自适应子序列聚类方法。提出了一种递归滤波器,将神经元激活的量化建模为标量,而不是像TKM和RSOM那样的向量。然后结合单层SOINN进行自适应聚类,将TKM和RSOM中的碎片聚类替换为平滑聚类结果。实验在两个数据集上进行,即来自开放Caltrans性能测量系统的交通流数据集和KDD Cup 99入侵检测数据集的一部分。实验结果表明,该方法在两个数据集上分别比传统方法提高了21.3%和9.1%。
{"title":"A temporal self-organizing neural network for adaptive sub-sequence clustering and case studies","authors":"Dong Wang, Yanfang Long, Zhu Xiao, Zhiyang Xiang, Wenjie Chen","doi":"10.1109/CITS.2016.7546436","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546436","url":null,"abstract":"Temporal neural networks such as Temporal Kohonen Map (TKM) and Recurrent Self-Organizing Map (RSOM) are popular for their incremental and explicit learning abilities. However, for sub-sequence clustering TKM and RSOM may generate many fragments whose classification membership is hard to decide. Besides they have stability issues in multivariate time series processing because they model the historical neuron activities on each variable independently. To overcome the drawbacks, we propose an adaptive sub-sequence clustering method based on single layered Self-Organizing Incremental Neural Network (SOINN). A recurrent filter is proposed to model the quantizations of neuron activations each as a scalar instead of a vector like in TKM and RSOM. Then it is integrated with the single layered SOINN for adaptive clustering where fragmented clusters in TKM and RSOM is replaced by a smoothed clustering result. Experiments are carried out on two datasets, namely a traffic flow dataset from open Caltrans performance measurement systems and a part of the KDD Cup 99 intrusion detection dataset. Experimental results show that the proposed method outperforms the conventional methods by 21.3% and 9.1% on the two datasets respectively.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115049395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A smart home control system based on indoor location and attitude estimation 一种基于室内定位和姿态估计的智能家居控制系统
Mingliang Xiong, Yiming Wu, Yipeng Ding, Xueyu Mao, Zhenyi Fang, Haiping Huang
The emergence of new technologies about the smart home system provides more innovative ideas and solutions, and the smart home system based on the Internet of Things can achieve the convenience of life by sensing, interconnection and intelligent control. However, most methods of controlling the appliances are based on the expatiatory menu, and users usually need to choose the electrical appliances by page turning of the menu items, which is not convenient. Therefore, this paper proposed a distinctive system based on indoor location and attitude estimation. Further more, the indoor location algorithm is achieved with the combination of image pattern recognition and fingerprint matching. The user can choose the appliances that he wants and control them by touching the screen of the mobile device while the mobile device is pointing to the appliance. The prototype of the smart home system is implemented and the availability test is conducted. It proved that the solution will simplify the control operation procedure and improve the user's experience.
关于智能家居系统的新技术的出现提供了更多创新的思路和解决方案,基于物联网的智能家居系统可以通过感知、互联和智能控制来实现生活的便捷。然而,大多数电器的控制方法都是基于冗长的菜单,用户通常需要通过菜单项的翻页来选择电器,这很不方便。因此,本文提出了一种基于室内定位和姿态估计的特色系统。在此基础上,将图像模式识别与指纹匹配相结合,实现了室内定位算法。当移动设备指向设备时,用户可以通过触摸移动设备的屏幕来选择他想要的设备并控制它们。实现了智能家居系统的原型,并进行了可用性测试。实践证明,该方案简化了控制操作程序,提高了用户的使用体验。
{"title":"A smart home control system based on indoor location and attitude estimation","authors":"Mingliang Xiong, Yiming Wu, Yipeng Ding, Xueyu Mao, Zhenyi Fang, Haiping Huang","doi":"10.1109/CITS.2016.7546460","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546460","url":null,"abstract":"The emergence of new technologies about the smart home system provides more innovative ideas and solutions, and the smart home system based on the Internet of Things can achieve the convenience of life by sensing, interconnection and intelligent control. However, most methods of controlling the appliances are based on the expatiatory menu, and users usually need to choose the electrical appliances by page turning of the menu items, which is not convenient. Therefore, this paper proposed a distinctive system based on indoor location and attitude estimation. Further more, the indoor location algorithm is achieved with the combination of image pattern recognition and fingerprint matching. The user can choose the appliances that he wants and control them by touching the screen of the mobile device while the mobile device is pointing to the appliance. The prototype of the smart home system is implemented and the availability test is conducted. It proved that the solution will simplify the control operation procedure and improve the user's experience.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122675115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Optimization of small cell deployment in heterogeneous wireless networks 异构无线网络中小蜂窝部署的优化
Wenjie Chen, Huashan Li, Zhongfeng Li, Zhu Xiao, Dong Wang
Various types of small cell base stations (SBSs) are deployed randomly in heterogeneous small cell network to meet the soaring growth in traffic, which leads to more and more complex network topological structure and resource management. In this paper, we analyze the coverage performance and energy efficiency of a two tier heterogeneous network which is composed of micro tier and pico tier. With the aid of stochastic geometry tools and PPP properties, the analytical expression of success probability for each tier is derived to evaluate the tier's coverage performance how to vary with the SBS deployment density. In addition, the energy efficiency optimization question is formulated in terms of the resource allocation fairness proposed in this paper. Base on the analytical results, numerical simulations show that the effects that the SBS deployment density has on the coverage performance and energy efficiency and confirms that there exits an optimal SBS density ratio among the two tier which can be applied to maximize the energy efficiency.
在异构小蜂窝网络中,各种类型的小蜂窝基站被随机部署,以满足日益增长的业务量,这使得网络拓扑结构和资源管理变得越来越复杂。本文分析了由微层和微层组成的两层异构网络的覆盖性能和能源效率。借助于随机几何工具和PPP特性,导出了各层成功概率的解析表达式,以评估各层的覆盖性能随SBS部署密度的变化情况。此外,根据本文提出的资源分配公平问题,提出了能效优化问题。在分析结果的基础上,通过数值模拟分析了SBS部署密度对覆盖性能和能效的影响,并证实了两层之间存在一个最优SBS密度比,可实现能效最大化。
{"title":"Optimization of small cell deployment in heterogeneous wireless networks","authors":"Wenjie Chen, Huashan Li, Zhongfeng Li, Zhu Xiao, Dong Wang","doi":"10.1109/CITS.2016.7546432","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546432","url":null,"abstract":"Various types of small cell base stations (SBSs) are deployed randomly in heterogeneous small cell network to meet the soaring growth in traffic, which leads to more and more complex network topological structure and resource management. In this paper, we analyze the coverage performance and energy efficiency of a two tier heterogeneous network which is composed of micro tier and pico tier. With the aid of stochastic geometry tools and PPP properties, the analytical expression of success probability for each tier is derived to evaluate the tier's coverage performance how to vary with the SBS deployment density. In addition, the energy efficiency optimization question is formulated in terms of the resource allocation fairness proposed in this paper. Base on the analytical results, numerical simulations show that the effects that the SBS deployment density has on the coverage performance and energy efficiency and confirms that there exits an optimal SBS density ratio among the two tier which can be applied to maximize the energy efficiency.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120944298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An improved root-MUSIC algorithm and MSE analysis 一种改进的根- music算法及MSE分析
Dijie Wang, Rong Chai, F. Gao
Root-MUSIC algorithm is a method of DOA estimation based on polynomial rooting. It estimated based on the cost function instead of peak searching, which greatly reduces the computation compared with MUSIC algorithm. However, it came with some other errors. In this letter, we propose a new method based on the the first-order derivative of the cost function and analyze the mean and the MSE of the proposed method. Simulation results show that the improved method performs better than the existing Root-MUSIC method.
根- music算法是一种基于多项式根的DOA估计方法。它基于代价函数而不是峰值搜索进行估计,与MUSIC算法相比大大减少了计算量。然而,它也带来了一些其他的错误。在这封信中,我们提出了一种基于成本函数一阶导数的新方法,并分析了该方法的均值和MSE。仿真结果表明,改进后的方法比现有的Root-MUSIC方法性能更好。
{"title":"An improved root-MUSIC algorithm and MSE analysis","authors":"Dijie Wang, Rong Chai, F. Gao","doi":"10.1109/CITS.2016.7546455","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546455","url":null,"abstract":"Root-MUSIC algorithm is a method of DOA estimation based on polynomial rooting. It estimated based on the cost function instead of peak searching, which greatly reduces the computation compared with MUSIC algorithm. However, it came with some other errors. In this letter, we propose a new method based on the the first-order derivative of the cost function and analyze the mean and the MSE of the proposed method. Simulation results show that the improved method performs better than the existing Root-MUSIC method.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121042545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The impact of device-to-device communication on the capacity of cellular systems 设备对设备通信对蜂窝系统容量的影响
Min Wang, Xianxian Wang, Xiaomeng Chai, W. Huangfu
In this paper, the capacity of underlaying cellular networks is analyzed by considering the impact of Device-to-Device (D2D) mode, which is shown to be capable of substantially enhancing the sum transmission rate of the cellular network. Based on the theory of stochastic geometry, the successful transmission probabilities of both the D2D users and the conventional cellular users(CUs) are derived, with the D2D transmission rate as well as the sum rate given out simultaneously. Furthermore, the optimal D2D-users(DUs) density that maximizes the sum rate is also derived. In addition, we extend the analysis from single-cell scenario to the multicell environment. Numerical results demonstrate the relationship between D2D-contributed capacity and the D2D-users density. It is shown that the network capacity can be enhanced by increasing the density D2D users when the D2D-users density is relatively low, until a break-even point is approach, in which case further increasing D2D users may even erode the sum rate.
本文通过考虑设备对设备(Device-to-Device, D2D)模式的影响,分析了底层蜂窝网络的容量,该模式被证明能够大幅提高蜂窝网络的总传输速率。基于随机几何理论,推导了D2D用户和传统蜂窝用户的成功传输概率,同时给出了D2D传输速率和和速率。此外,还推导出了最大求和速率的最佳d2d用户(DUs)密度。此外,我们将分析从单细胞场景扩展到多细胞环境。数值结果证明了d2d贡献容量与d2d用户密度之间的关系。研究表明,当D2D用户密度较低时,可以通过增加D2D用户密度来增强网络容量,直到接近盈亏平衡点,在这种情况下,进一步增加D2D用户甚至可能侵蚀求和速率。
{"title":"The impact of device-to-device communication on the capacity of cellular systems","authors":"Min Wang, Xianxian Wang, Xiaomeng Chai, W. Huangfu","doi":"10.1109/CITS.2016.7546406","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546406","url":null,"abstract":"In this paper, the capacity of underlaying cellular networks is analyzed by considering the impact of Device-to-Device (D2D) mode, which is shown to be capable of substantially enhancing the sum transmission rate of the cellular network. Based on the theory of stochastic geometry, the successful transmission probabilities of both the D2D users and the conventional cellular users(CUs) are derived, with the D2D transmission rate as well as the sum rate given out simultaneously. Furthermore, the optimal D2D-users(DUs) density that maximizes the sum rate is also derived. In addition, we extend the analysis from single-cell scenario to the multicell environment. Numerical results demonstrate the relationship between D2D-contributed capacity and the D2D-users density. It is shown that the network capacity can be enhanced by increasing the density D2D users when the D2D-users density is relatively low, until a break-even point is approach, in which case further increasing D2D users may even erode the sum rate.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116222807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A priority based message forwarding scheme for Opportunistic Networks 机会网络中基于优先级的消息转发方案
D. Sharma, S. K. Dhurandher, M. Obaidat, Sahil Pruthi, B. Sadoun
Opportunistic Networks (Oppnets) are the recent evolution of Mobile Ad hoc Networks (MANETs), where an end to end path from the source to the destination does not exist, or exists for a very small amount of time. That is, the connections between the nodes are often intermittent, and the power of the nodes may go up or down. This paper aims at improving the forwarding strategy in the Epidemic routing protocol for Oppnets, which currently makes use of First in First Out (FIFO) strategy to forward the data packets. In this work, Priority Based Forwarding for Epidemic Routing (PBFER) is presented that forwards the packets based on the priority of messages. Through simulations the performance of PBFER is evaluated and compared with Epidemic routing protocol. It has been found out that PBFER performs better than the Epidemic protocol in terms of the number of high priority messages received, latency, delivery probability, overhead ratio, average hop count.
机会网络(Oppnets)是移动自组织网络(manet)的最新发展,其中不存在从源到目标的端到端路径,或者存在非常短的时间。也就是说,节点之间的连接通常是间歇性的,节点的功率可能会上升或下降。本文旨在改进Oppnets流行病路由协议中的转发策略,该协议目前使用先进先出(FIFO)策略来转发数据包。本文提出了基于优先级的流行病路由转发技术(PBFER),该技术根据报文的优先级对报文进行转发。通过仿真对PBFER的性能进行了评价,并与Epidemic路由协议进行了比较。结果表明,在接收到的高优先级消息数、延迟时间、发送概率、开销比、平均跳数等方面,PBFER都优于Epidemic协议。
{"title":"A priority based message forwarding scheme for Opportunistic Networks","authors":"D. Sharma, S. K. Dhurandher, M. Obaidat, Sahil Pruthi, B. Sadoun","doi":"10.1109/CITS.2016.7546424","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546424","url":null,"abstract":"Opportunistic Networks (Oppnets) are the recent evolution of Mobile Ad hoc Networks (MANETs), where an end to end path from the source to the destination does not exist, or exists for a very small amount of time. That is, the connections between the nodes are often intermittent, and the power of the nodes may go up or down. This paper aims at improving the forwarding strategy in the Epidemic routing protocol for Oppnets, which currently makes use of First in First Out (FIFO) strategy to forward the data packets. In this work, Priority Based Forwarding for Epidemic Routing (PBFER) is presented that forwards the packets based on the priority of messages. Through simulations the performance of PBFER is evaluated and compared with Epidemic routing protocol. It has been found out that PBFER performs better than the Epidemic protocol in terms of the number of high priority messages received, latency, delivery probability, overhead ratio, average hop count.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126346195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
The impact of relative distance on artificial-noise-aided secure transmission 相对距离对人工噪声辅助安全传输的影响
Hao Deng, Huiming Wang, Yi Zhang, Qian Yang, Xueqin Jiang, Wenjie Wang
In this paper, we investigate the impact of relative distance and large-scale fading of legitimate user and eavesdropper on the artificial noise (AN) assisted secrecy scheme in a multiple-input single-output (MISO) wiretap channel. We show that AN does not always improve the achievable ergodic secrecy rate (ESR), and provide an exact signal-to-noise ratio (SNR) threshold below which AN does not work. We also derive approximately closed-form expressions of AN secrecy gain, which is defined as the difference between the ESR with AN and without AN. Analytical and numerical results verify that the relative distance impacts greatly on the SNR threshold and the AN secrecy gain.
本文研究了合法用户和窃听者的相对距离和大规模衰落对多输入单输出窃听信道中人工噪声(AN)辅助保密方案的影响。我们证明了AN并不总是提高可实现的遍历保密率(ESR),并提供了一个精确的信噪比(SNR)阈值,低于该阈值AN就不起作用。我们还导出了AN保密增益的近似封闭表达式,它被定义为带AN和不带AN的ESR之差。分析和数值结果验证了相对距离对信噪比阈值和AN保密增益的影响。
{"title":"The impact of relative distance on artificial-noise-aided secure transmission","authors":"Hao Deng, Huiming Wang, Yi Zhang, Qian Yang, Xueqin Jiang, Wenjie Wang","doi":"10.1109/CITS.2016.7546418","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546418","url":null,"abstract":"In this paper, we investigate the impact of relative distance and large-scale fading of legitimate user and eavesdropper on the artificial noise (AN) assisted secrecy scheme in a multiple-input single-output (MISO) wiretap channel. We show that AN does not always improve the achievable ergodic secrecy rate (ESR), and provide an exact signal-to-noise ratio (SNR) threshold below which AN does not work. We also derive approximately closed-form expressions of AN secrecy gain, which is defined as the difference between the ESR with AN and without AN. Analytical and numerical results verify that the relative distance impacts greatly on the SNR threshold and the AN secrecy gain.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130320642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2016 International Conference on Computer, Information and Telecommunication Systems (CITS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1