首页 > 最新文献

2015 22nd International Conference on Telecommunications (ICT)最新文献

英文 中文
REAR: A radio environment adaptive routing protocol for CR Mobile Ad hoc Networks 面向CR移动自组织网络的无线电环境自适应路由协议
Pub Date : 2015-04-27 DOI: 10.1109/ICT.2015.7124667
Y. Sun, Yuhui Yao, D. Han, C. Phillips
This paper proposes a cross-layer wireless routing protocol called REAR (Radio Environment Adaptive Routing Protocol), which operates with Cognitive Radio (CR) Mobile Ad Hoc Networks (CRMANET). Unlike conventional on-demand routing protocols for ad hoc networks, the design of REAR allows nodes along the route to adjust the next hop according to real-time radio environment conditions during the transmission. This flexibility benefits the communication by reducing the risk of link breaks in the CRMANET and so improves the overall network performance and spectrum utilization. Simulation results show that, compared to DSR [2] and CRMBR [8], REAR provides higher robustness in a rapid changing ad hoc environment. Therefore the overall network throughput is improved with reduced end-to-end delay.
本文提出了一种适用于认知无线电(CR)移动自组织网络(CRMANET)的跨层无线路由协议REAR (Radio Environment Adaptive routing protocol)。与传统的自组织网络的按需路由协议不同,REAR的设计允许路由沿线的节点在传输过程中根据实时无线电环境条件调整下一跳。这种灵活性降低了CRMANET中链路中断的风险,有利于通信,从而提高了整体网络性能和频谱利用率。仿真结果表明,与DSR[2]和CRMBR[8]相比,REAR在快速变化的ad hoc环境中具有更高的鲁棒性。因此,整体网络吞吐量得到提高,端到端延迟减少。
{"title":"REAR: A radio environment adaptive routing protocol for CR Mobile Ad hoc Networks","authors":"Y. Sun, Yuhui Yao, D. Han, C. Phillips","doi":"10.1109/ICT.2015.7124667","DOIUrl":"https://doi.org/10.1109/ICT.2015.7124667","url":null,"abstract":"This paper proposes a cross-layer wireless routing protocol called REAR (Radio Environment Adaptive Routing Protocol), which operates with Cognitive Radio (CR) Mobile Ad Hoc Networks (CRMANET). Unlike conventional on-demand routing protocols for ad hoc networks, the design of REAR allows nodes along the route to adjust the next hop according to real-time radio environment conditions during the transmission. This flexibility benefits the communication by reducing the risk of link breaks in the CRMANET and so improves the overall network performance and spectrum utilization. Simulation results show that, compared to DSR [2] and CRMBR [8], REAR provides higher robustness in a rapid changing ad hoc environment. Therefore the overall network throughput is improved with reduced end-to-end delay.","PeriodicalId":375669,"journal":{"name":"2015 22nd International Conference on Telecommunications (ICT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122986008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A tree-based regularized orthogonal matching pursuit algorithm 基于树的正则化正交匹配追踪算法
Pub Date : 2015-04-27 DOI: 10.1109/ICT.2015.7124708
Zhilin Li, Wenbo Xu, Yue Wang, Jiaru Lin
Reconstruction algorithm is a significant research field of compressed sensing (CS). Among existing algorithms, regularized orthogonal matching pursuit (ROMP) enjoys the merit of implementing fast recovery procedures. Recent studies have recognized that sparse signals have special sparse structure, which is useful for reconstruction as prior information. In this paper, by utilizing the sparse tree structure as prior information, we propose a tree-based regularized orthogonal matching pursuit (T-ROMP) reconstruction algorithm. Furthermore, we set a ratio factor to reduce the error probability of the support set. Compared to ROMP, simulation results indicate that the proposed algorithm achieve better reconstruction performance for different conditions.
重构算法是压缩感知(CS)的一个重要研究领域。在现有算法中,正则化正交匹配追踪算法(ROMP)具有实现快速恢复的优点。近年来的研究已经认识到,稀疏信号具有特殊的稀疏结构,可以作为先验信息进行重构。本文利用稀疏树结构作为先验信息,提出了一种基于树的正则化正交匹配追踪(T-ROMP)重建算法。此外,我们还设置了一个比值因子来降低支持集的错误概率。仿真结果表明,与ROMP算法相比,该算法在不同条件下具有更好的重构性能。
{"title":"A tree-based regularized orthogonal matching pursuit algorithm","authors":"Zhilin Li, Wenbo Xu, Yue Wang, Jiaru Lin","doi":"10.1109/ICT.2015.7124708","DOIUrl":"https://doi.org/10.1109/ICT.2015.7124708","url":null,"abstract":"Reconstruction algorithm is a significant research field of compressed sensing (CS). Among existing algorithms, regularized orthogonal matching pursuit (ROMP) enjoys the merit of implementing fast recovery procedures. Recent studies have recognized that sparse signals have special sparse structure, which is useful for reconstruction as prior information. In this paper, by utilizing the sparse tree structure as prior information, we propose a tree-based regularized orthogonal matching pursuit (T-ROMP) reconstruction algorithm. Furthermore, we set a ratio factor to reduce the error probability of the support set. Compared to ROMP, simulation results indicate that the proposed algorithm achieve better reconstruction performance for different conditions.","PeriodicalId":375669,"journal":{"name":"2015 22nd International Conference on Telecommunications (ICT)","volume":"307 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114804977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Unified framework for multifactor authentication 统一的多因素认证框架
Pub Date : 2015-04-27 DOI: 10.1109/ICT.2015.7124684
C. Pavlovski, Claudia Warwar, Brett Paskin, Gary Chan
The progression towards the use of mobile network devices in all facets of personal, business and leisure activity has created new threats to users and challenges to the industry to preserve security and privacy. Whilst mobility provides a means for interacting with others and accessing content in an easy and malleable way, these devices are increasingly being targeted by malicious parties in a variety of attacks. In addition, web technologies and applications are supplying more function and capability that attracts users to social media sites, e-shopping malls, and for managing finances (banking). The primary mechanism for authentication still employs a username and password based approach. This is often extended with additional (multifactor) authentication tools such as one time identifiers, hardware tokens, and biometrics. In this paper we discuss the threats, risks and challenges with user authentication and present the techniques to counter these problems with several patterns and approaches. We then outline a framework for supplying these authentication capabilities to the industry based on a unified authentication hub.
移动网络设备在个人、商务和休闲活动的各个方面的使用,给用户带来了新的威胁,也给行业在保护安全和隐私方面带来了挑战。虽然移动性提供了一种与他人互动和以一种简单而灵活的方式访问内容的手段,但这些设备越来越多地成为各种攻击的恶意方的目标。此外,网络技术和应用程序正在提供更多的功能和能力,吸引用户使用社交媒体网站、电子购物中心和管理财务(银行)。身份验证的主要机制仍然采用基于用户名和密码的方法。这通常使用其他(多因素)身份验证工具进行扩展,例如一次性标识符、硬件令牌和生物识别技术。在本文中,我们讨论了用户身份验证的威胁、风险和挑战,并介绍了使用几种模式和方法来解决这些问题的技术。然后,我们概述了一个框架,该框架基于统一的身份验证中心为行业提供这些身份验证功能。
{"title":"Unified framework for multifactor authentication","authors":"C. Pavlovski, Claudia Warwar, Brett Paskin, Gary Chan","doi":"10.1109/ICT.2015.7124684","DOIUrl":"https://doi.org/10.1109/ICT.2015.7124684","url":null,"abstract":"The progression towards the use of mobile network devices in all facets of personal, business and leisure activity has created new threats to users and challenges to the industry to preserve security and privacy. Whilst mobility provides a means for interacting with others and accessing content in an easy and malleable way, these devices are increasingly being targeted by malicious parties in a variety of attacks. In addition, web technologies and applications are supplying more function and capability that attracts users to social media sites, e-shopping malls, and for managing finances (banking). The primary mechanism for authentication still employs a username and password based approach. This is often extended with additional (multifactor) authentication tools such as one time identifiers, hardware tokens, and biometrics. In this paper we discuss the threats, risks and challenges with user authentication and present the techniques to counter these problems with several patterns and approaches. We then outline a framework for supplying these authentication capabilities to the industry based on a unified authentication hub.","PeriodicalId":375669,"journal":{"name":"2015 22nd International Conference on Telecommunications (ICT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127336196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A bypassing void routing combining of geographic and virtual coordinate information for WSN 一种结合地理和虚拟坐标信息的无线传感器网络旁路空路由
Pub Date : 2015-04-27 DOI: 10.1109/ICT.2015.7124668
Dejing Zhang, Enqing Dong
Greedy forwarding is efficient in geographic routing, however, it fails inevitably when routing voids are encountered due to the distribution of nodes in wireless sensor network. To solve the void problem, long path and high control packet overhead are usually involved. In this paper, a bypassing void routing protocol combining of geographic and virtual coordinate information is proposed. When routing void is encountered, edges nodes of routing void are assigned virtual coordinates located on a virtual circle and two different forwarding regions around void are established. By utilizing the virtual circle structure and two forwarding regions, greedy forwarding can work without failing. Simulation shows the proposed protocol has shorter path length, less control packet overhead and energy consumption.
贪婪转发在地理路由中是有效的,但由于无线传感器网络中节点的分布,当遇到路由空洞时,贪婪转发不可避免地会失败。为了解决空洞问题,通常涉及到较长的路径和较高的控制数据包开销。本文提出了一种结合地理和虚拟坐标信息的绕过空路由协议。当遇到路由空洞时,给路由空洞的边缘节点分配位于虚拟圆上的虚拟坐标,并在空洞周围建立两个不同的转发区域。利用虚拟圆结构和两个转发区域,可以实现贪婪转发不失败。仿真结果表明,该协议具有路径长度短、控制包开销小、能耗低等优点。
{"title":"A bypassing void routing combining of geographic and virtual coordinate information for WSN","authors":"Dejing Zhang, Enqing Dong","doi":"10.1109/ICT.2015.7124668","DOIUrl":"https://doi.org/10.1109/ICT.2015.7124668","url":null,"abstract":"Greedy forwarding is efficient in geographic routing, however, it fails inevitably when routing voids are encountered due to the distribution of nodes in wireless sensor network. To solve the void problem, long path and high control packet overhead are usually involved. In this paper, a bypassing void routing protocol combining of geographic and virtual coordinate information is proposed. When routing void is encountered, edges nodes of routing void are assigned virtual coordinates located on a virtual circle and two different forwarding regions around void are established. By utilizing the virtual circle structure and two forwarding regions, greedy forwarding can work without failing. Simulation shows the proposed protocol has shorter path length, less control packet overhead and energy consumption.","PeriodicalId":375669,"journal":{"name":"2015 22nd International Conference on Telecommunications (ICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122091495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Wiretap channel with finite-rate feedback 具有有限速率反馈的窃听通道
Pub Date : 2015-04-27 DOI: 10.1109/ICT.2015.7124692
Shuiyin Liu, Y. Hong, E. Viterbo
While the impact of finite-rate feedback on the capacity of fading channels has been extensively studied in the literature, not much attention has been paid to this problem under secrecy constraint. This paper provides a survey of recent research on physical-layer security considering quantized channel state information (CSI) at the transmitter and perfect CSI at the legitimate receiver, under the assumption that only the statistics of eavesdropper CSI is known at the transmitter. We start by introducing the classical notion of secrecy capacity. Then we show how finite-rate feedback degrades the secrecy capacity.
虽然有限速率反馈对衰落信道容量的影响已经在文献中得到了广泛的研究,但在保密约束下对这一问题的关注并不多。本文综述了在发射机只知道窃听者信道状态信息统计的情况下,考虑发射机信道状态信息量化和合法接收机信道状态信息完美化的物理层安全研究现状。我们首先介绍保密能力的经典概念。然后我们展示了有限速率反馈是如何降低保密能力的。
{"title":"Wiretap channel with finite-rate feedback","authors":"Shuiyin Liu, Y. Hong, E. Viterbo","doi":"10.1109/ICT.2015.7124692","DOIUrl":"https://doi.org/10.1109/ICT.2015.7124692","url":null,"abstract":"While the impact of finite-rate feedback on the capacity of fading channels has been extensively studied in the literature, not much attention has been paid to this problem under secrecy constraint. This paper provides a survey of recent research on physical-layer security considering quantized channel state information (CSI) at the transmitter and perfect CSI at the legitimate receiver, under the assumption that only the statistics of eavesdropper CSI is known at the transmitter. We start by introducing the classical notion of secrecy capacity. Then we show how finite-rate feedback degrades the secrecy capacity.","PeriodicalId":375669,"journal":{"name":"2015 22nd International Conference on Telecommunications (ICT)","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132406801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secure cognitive radio system with cooperative secondary networks 安全的认知无线电系统与合作的次级网络
Pub Date : 2015-04-27 DOI: 10.1109/ICT.2015.7124648
Wenli Liu, Li Guo, Tianyu Kang, Jianwei Zhang, Jiaru Lin
In cognitive radio (CR) systems, we often use jamming schemes to improve the physical-layer security in the presence of passive eavesdroppers. However, it also needs additional signal sources to transmit artificial noise. In this paper, we investigate the multiple-input single-output (MISO) cognitive radio system where two secondary links secure each other's communication. Each secondary transmitter (ST) sends intended messages to its own receiver while acts as a friendly jammer to the other CRN. Our target is to maximize the worst-user's secrecy rate while limiting the interference in the direction of the primary receiver. We solve the problem through a sequence of convex semidefinite programs (SDPs) under individual power constraints. We also introduce two sub-optimal zero-forcing (ZF) beamforming methods, one of which solves the problem based on SDP and the other adopts the approach of Pareto-optimal parameterization in a more computationally efficient way.
在认知无线电(CR)系统中,在被动窃听者存在的情况下,我们经常使用干扰方案来提高物理层的安全性。然而,它还需要额外的信号源来传输人工噪声。在本文中,我们研究了多输入单输出(MISO)认知无线电系统,其中两个辅助链路相互保护通信。每个辅助发射机(ST)向自己的接收机发送预定的信息,同时对其他CRN充当友好干扰器。我们的目标是最大化最差用户的保密率,同时限制主接收方向的干扰。我们通过单个功率约束下的凸半定规划序列来解决这个问题。本文还介绍了两种次优零强迫波束形成方法,其中一种是基于SDP解决问题,另一种是采用pareto最优参数化方法,计算效率更高。
{"title":"Secure cognitive radio system with cooperative secondary networks","authors":"Wenli Liu, Li Guo, Tianyu Kang, Jianwei Zhang, Jiaru Lin","doi":"10.1109/ICT.2015.7124648","DOIUrl":"https://doi.org/10.1109/ICT.2015.7124648","url":null,"abstract":"In cognitive radio (CR) systems, we often use jamming schemes to improve the physical-layer security in the presence of passive eavesdroppers. However, it also needs additional signal sources to transmit artificial noise. In this paper, we investigate the multiple-input single-output (MISO) cognitive radio system where two secondary links secure each other's communication. Each secondary transmitter (ST) sends intended messages to its own receiver while acts as a friendly jammer to the other CRN. Our target is to maximize the worst-user's secrecy rate while limiting the interference in the direction of the primary receiver. We solve the problem through a sequence of convex semidefinite programs (SDPs) under individual power constraints. We also introduce two sub-optimal zero-forcing (ZF) beamforming methods, one of which solves the problem based on SDP and the other adopts the approach of Pareto-optimal parameterization in a more computationally efficient way.","PeriodicalId":375669,"journal":{"name":"2015 22nd International Conference on Telecommunications (ICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130034148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Energy efficient contention window adaptation algorithm for IEEE 802.11 WLAN IEEE 802.11无线局域网的节能竞争窗口自适应算法
Pub Date : 2015-04-27 DOI: 10.1109/ICT.2015.7124657
W. Muhamad, J. Khan, Jason Brown
This paper introduces a new contention window (CW) adaptation algorithm to reduce the collision level in an IEEE802.11 based network with the main objective of maximizing energy efficiency while maintaining required Quality of Service (QoS) performance. The main concept of the proposed algorithm is to dynamically adjust the contention window size according to the network load condition, which represents the level of congestion in a network. Performance analysis is carried out using an OPNET based simulation model to study the effects of CW adaptation on the energy efficiency and QoS performance. Performance of the proposed algorithm is compared with the legacy Distributed Coordination Function (DCF) and other CW adaptation algorithms such as Fast Collision Resolution (FCR) and CW tuning. The results show that the proposed algorithm outperforms the other techniques in terms of reducing collision level and that directly translates to higher energy efficiency as well as better QoS performance. The proposed protocol can be extended to support multi-class traffic with different priorities.
本文介绍了一种新的竞争窗口(CW)自适应算法,以降低基于IEEE802.11的网络中的冲突级别,其主要目标是在保持所需的服务质量(QoS)性能的同时最大化能源效率。该算法的主要思想是根据反映网络拥塞程度的网络负载状况动态调整争用窗口大小。利用基于OPNET的仿真模型进行性能分析,研究连续波自适应对能量效率和QoS性能的影响。将该算法的性能与传统的分布式协调函数(DCF)和其他连续波自适应算法(如快速冲突解决(FCR)和连续波调谐)进行了比较。结果表明,该算法在降低碰撞级别方面优于其他技术,这直接转化为更高的能源效率和更好的QoS性能。该协议可以扩展到支持不同优先级的多类流量。
{"title":"Energy efficient contention window adaptation algorithm for IEEE 802.11 WLAN","authors":"W. Muhamad, J. Khan, Jason Brown","doi":"10.1109/ICT.2015.7124657","DOIUrl":"https://doi.org/10.1109/ICT.2015.7124657","url":null,"abstract":"This paper introduces a new contention window (CW) adaptation algorithm to reduce the collision level in an IEEE802.11 based network with the main objective of maximizing energy efficiency while maintaining required Quality of Service (QoS) performance. The main concept of the proposed algorithm is to dynamically adjust the contention window size according to the network load condition, which represents the level of congestion in a network. Performance analysis is carried out using an OPNET based simulation model to study the effects of CW adaptation on the energy efficiency and QoS performance. Performance of the proposed algorithm is compared with the legacy Distributed Coordination Function (DCF) and other CW adaptation algorithms such as Fast Collision Resolution (FCR) and CW tuning. The results show that the proposed algorithm outperforms the other techniques in terms of reducing collision level and that directly translates to higher energy efficiency as well as better QoS performance. The proposed protocol can be extended to support multi-class traffic with different priorities.","PeriodicalId":375669,"journal":{"name":"2015 22nd International Conference on Telecommunications (ICT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132875402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Beamforming design for weighted rate balance in cognitive network 认知网络中加权速率平衡的波束形成设计
Pub Date : 2015-04-27 DOI: 10.1109/ICT.2015.7124649
Jun Zhang, Li Guo, Tianyu Kang, Jianwei Zhang
When a cognitive radio network shares the spectrum with a primary network, the harmful interference to the primary users is one of the most important concerns. In this paper, we propose a new cognitive scheme which has two cognitive sub-networks sharing the same relay station, considering the interference to the primary user. We study the Weighted Rate Balance problem with the constraint of the transmit power of the cognitive network. Joint beamforming at the cognitive base station and the relay station is used to maximize the Weighted Rate Balance of SUs. To solve the non-convex problem, we adopt the classic altering optimization method, namely the Blahut-Arimoto algorithm. We show that we only need to solve several semidefinite programming(SDP) sub-problems, which have linear matrix inequalities(LMIs), in each iterative step. Simulation results show that, compared with the widely studied diagonally structured beamforming design, the proposed approach performs better.
当认知无线网络与主网络共享频谱时,对主用户的有害干扰是最重要的问题之一。考虑到对主用户的干扰,提出了一种由两个认知子网共享同一中继站的认知方案。研究了以认知网络传输功率为约束的加权速率平衡问题。采用认知基站和中继站联合波束形成的方法,最大限度地提高各单元的加权速率平衡。为了解决非凸问题,我们采用了经典的改变优化方法,即Blahut-Arimoto算法。我们证明在每个迭代步骤中只需要求解几个具有线性矩阵不等式(lmi)的半定规划子问题。仿真结果表明,与广泛研究的对角结构波束形成设计相比,该方法具有更好的性能。
{"title":"Beamforming design for weighted rate balance in cognitive network","authors":"Jun Zhang, Li Guo, Tianyu Kang, Jianwei Zhang","doi":"10.1109/ICT.2015.7124649","DOIUrl":"https://doi.org/10.1109/ICT.2015.7124649","url":null,"abstract":"When a cognitive radio network shares the spectrum with a primary network, the harmful interference to the primary users is one of the most important concerns. In this paper, we propose a new cognitive scheme which has two cognitive sub-networks sharing the same relay station, considering the interference to the primary user. We study the Weighted Rate Balance problem with the constraint of the transmit power of the cognitive network. Joint beamforming at the cognitive base station and the relay station is used to maximize the Weighted Rate Balance of SUs. To solve the non-convex problem, we adopt the classic altering optimization method, namely the Blahut-Arimoto algorithm. We show that we only need to solve several semidefinite programming(SDP) sub-problems, which have linear matrix inequalities(LMIs), in each iterative step. Simulation results show that, compared with the widely studied diagonally structured beamforming design, the proposed approach performs better.","PeriodicalId":375669,"journal":{"name":"2015 22nd International Conference on Telecommunications (ICT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122017528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A spectrum efficient polarized PSK/QAM scheme in the wireless channel with polarization dependent loss effect 一种具有极化相关损耗效应的频谱高效极化PSK/QAM方案
Pub Date : 2015-04-27 DOI: 10.1109/ICT.2015.7124691
Dong Wei, Meng Zhang, W. Fan, Wei-qing Huang
A Polarized Phase Shifting Keying/Quadrature Amplitude Modulation(PPSK/PQAM) scheme in the wireless depolarized channel is proposed. Such scheme uses the carrier's polarization state, amplitude and phase as the information bearing parameters, and can further improve the traditional modulation methods' spectrum efficiency. The impairment to PPSK/PQAM from the wireless depolarized channel is quantitatively analyzed. To mitigate such impairment, a constellation compensation algorithm is also presented. Furthermore, the PPSK/PQAM's symbol error rate is derived on the basis of the proposed constellation compensation; then to maximize the PPSK/PQAM's link spectrum efficiency (LSE), the optimal modulation ratio, which is defined as the ratio of the data rata achieved by the polarization state and amplitude-phase, is also calculated. Finally, simulations show that PPSK/PQAM's SER and LSE performance have significant advantage over the traditional PSK/QAM modulation methods.
提出了一种用于无线去极化信道的极化移相键控/正交调幅(PPSK/PQAM)方案。该方案利用载波的极化状态、幅值和相位作为承载信息的参数,进一步提高了传统调制方法的频谱效率。定量分析了无线去极化信道对PPSK/PQAM的损害。为了减轻这种损害,还提出了一种星座补偿算法。在星座补偿的基础上,推导出了psk /PQAM的符号错误率;然后,为了最大限度地提高PPSK/PQAM的链路频谱效率(LSE),还计算了最优调制比,该调制比定义为极化状态与幅相所达到的数据率之比。最后,仿真结果表明,与传统的PSK/QAM调制方法相比,PPSK/PQAM的SER和LSE性能具有显著的优势。
{"title":"A spectrum efficient polarized PSK/QAM scheme in the wireless channel with polarization dependent loss effect","authors":"Dong Wei, Meng Zhang, W. Fan, Wei-qing Huang","doi":"10.1109/ICT.2015.7124691","DOIUrl":"https://doi.org/10.1109/ICT.2015.7124691","url":null,"abstract":"A Polarized Phase Shifting Keying/Quadrature Amplitude Modulation(PPSK/PQAM) scheme in the wireless depolarized channel is proposed. Such scheme uses the carrier's polarization state, amplitude and phase as the information bearing parameters, and can further improve the traditional modulation methods' spectrum efficiency. The impairment to PPSK/PQAM from the wireless depolarized channel is quantitatively analyzed. To mitigate such impairment, a constellation compensation algorithm is also presented. Furthermore, the PPSK/PQAM's symbol error rate is derived on the basis of the proposed constellation compensation; then to maximize the PPSK/PQAM's link spectrum efficiency (LSE), the optimal modulation ratio, which is defined as the ratio of the data rata achieved by the polarization state and amplitude-phase, is also calculated. Finally, simulations show that PPSK/PQAM's SER and LSE performance have significant advantage over the traditional PSK/QAM modulation methods.","PeriodicalId":375669,"journal":{"name":"2015 22nd International Conference on Telecommunications (ICT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125848507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Secure TWRC system based on channel quantized PNC 基于信道量化PNC的安全TWRC系统
Pub Date : 2015-04-27 DOI: 10.1109/ICT.2015.7124682
Weizhong Zheng, Shengli Zhang, G. Wang, Qing F. Zhou, Mingjun Dai
Because of the broadcasting nature of wireless communications, passive eavesdropping is a well-known security loophole. Generally there are two basic ideas to deal with the eavesdropper at physical layer: friendly jamming and channel state information dependent encoding. Based on the channel quantized physical-layer network coding (CQ-PNC), we propose a secured CQ-PNC scheme to combine both ideas aforementioned to prevent the eavesdropper from obtaining the messages. Specifically, the CQ-PNC consists of co-channel signal superposition in the air (friendly jamming) and channel state information dependent mapping (PNC mapping). As a result, the information is more difficult to be detected at the eavesdropper, meanwhile there is almost no rate loss at the legal receiver. To verify the effectiveness of the proposed secure CQ-PNC, we implemented the scheme on a software defined radio (USRP) experimental platform.
由于无线通信的广播性质,无源窃听是一个众所周知的安全漏洞。在物理层对付窃听者一般有两种基本思路:友好干扰和信道状态信息相关编码。在信道量化物理层网络编码(CQ-PNC)的基础上,我们提出了一种安全的CQ-PNC方案,将上述两种思想结合起来,防止窃听者获取信息。具体来说,CQ-PNC由空中同信道信号叠加(友好干扰)和信道状态信息相关映射(PNC映射)组成。这样一来,信息在窃听方更难被发现,而在合法接收方几乎没有速率损失。为了验证所提出的安全CQ-PNC的有效性,我们在一个软件定义无线电(USRP)实验平台上实现了该方案。
{"title":"Secure TWRC system based on channel quantized PNC","authors":"Weizhong Zheng, Shengli Zhang, G. Wang, Qing F. Zhou, Mingjun Dai","doi":"10.1109/ICT.2015.7124682","DOIUrl":"https://doi.org/10.1109/ICT.2015.7124682","url":null,"abstract":"Because of the broadcasting nature of wireless communications, passive eavesdropping is a well-known security loophole. Generally there are two basic ideas to deal with the eavesdropper at physical layer: friendly jamming and channel state information dependent encoding. Based on the channel quantized physical-layer network coding (CQ-PNC), we propose a secured CQ-PNC scheme to combine both ideas aforementioned to prevent the eavesdropper from obtaining the messages. Specifically, the CQ-PNC consists of co-channel signal superposition in the air (friendly jamming) and channel state information dependent mapping (PNC mapping). As a result, the information is more difficult to be detected at the eavesdropper, meanwhile there is almost no rate loss at the legal receiver. To verify the effectiveness of the proposed secure CQ-PNC, we implemented the scheme on a software defined radio (USRP) experimental platform.","PeriodicalId":375669,"journal":{"name":"2015 22nd International Conference on Telecommunications (ICT)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131259138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2015 22nd International Conference on Telecommunications (ICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1