首页 > 最新文献

IET International Conference on Wireless Communications and Applications最新文献

英文 中文
Image compression with short-term visual encryption using the burrow wheeler transform and keyed transpose 利用洞惠勒变换和键控转置进行短期视觉加密的图像压缩
Pub Date : 1900-01-01 DOI: 10.1049/cp.2012.2112
J. Kong, K. Seng, L. Yeong, L. Ang
In some wireless sensor network image processing applications, visual data such as the surveillance imagery or video streaming might contain high commercial value but devalues over time. For such multimedia, the security requirement is usually low or just sufficient to disguise and protect the value of the payload for a short-term period. Multimedia compression is a necessity for these large-sized data and the unification of security and compression properties would greatly increase the practicality of the image processing algorithm. In this paper, we are presenting the image results of using the BWCA (Burrow Wheeler Compression Algorithm) on images with the proposed conditional transposition methodology (keyed transpose) for a short-term visual protection and the results for subjective metric perceptual assessment of the quality and the BWT effects on the images. (6 pages)
在一些无线传感器网络图像处理应用中,监控图像或视频流等视觉数据可能具有很高的商业价值,但随着时间的推移会贬值。对于这样的多媒体,安全性要求通常很低,或者仅足以在短期内掩盖和保护有效负载的价值。对于这些大数据,多媒体压缩是必要的,而安全性和压缩性能的统一将大大提高图像处理算法的实用性。在本文中,我们展示了使用BWCA (Burrow Wheeler压缩算法)和提出的条件转置方法(键控转置)对图像进行短期视觉保护的图像结果,以及对图像质量和BWT效果进行主观度量感知评估的结果。(6页)
{"title":"Image compression with short-term visual encryption using the burrow wheeler transform and keyed transpose","authors":"J. Kong, K. Seng, L. Yeong, L. Ang","doi":"10.1049/cp.2012.2112","DOIUrl":"https://doi.org/10.1049/cp.2012.2112","url":null,"abstract":"In some wireless sensor network image processing applications, visual data such as the surveillance imagery or video streaming might contain high commercial value but devalues over time. For such multimedia, the security requirement is usually low or just sufficient to disguise and protect the value of the payload for a short-term period. Multimedia compression is a necessity for these large-sized data and the unification of security and compression properties would greatly increase the practicality of the image processing algorithm. In this paper, we are presenting the image results of using the BWCA (Burrow Wheeler Compression Algorithm) on images with the proposed conditional transposition methodology (keyed transpose) for a short-term visual protection and the results for subjective metric perceptual assessment of the quality and the BWT effects on the images. (6 pages)","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126748725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improved look-ahead re-synchronization window for HMAC-based one-time password 改进了基于hmac的一次性密码的预检重新同步窗口
Pub Date : 1900-01-01 DOI: 10.1049/cp.2012.2111
Alireza Beikverdi, I. Tan
With the abundance of mobile wireless devices ranging from notebooks to smart phones, it has become convenient for One-Time Passwords (OTP) mechanism to be used for authentication. OTP are generated for single use purposes only and are generally generated on demand and have a limited usable shelf life. Upon usage, the password will be invalidated on both the client and the server side of the authentication system. A popular and standardized OTP system is the Hashed Message Authentication Code (HMAC) Based OTP (HOTP). In the HOTP system, the OTP is generated on the client side by firstly generating an encryption key that is derived from a shared secret key and incrementing a counter value. The final value generated is then truncated to the number of digits as per required by the OTP. On the server side, the same computation is generated and the OTP generated are compared for authentication. Signal interruptions in wireless environments may cause the need to regenerate a new OTP on the client side and hence causes the dynamic counter value to be desynchronized with the server. In the event that a mismatch occurs during the authentication process, the server increases the counter value within a look-ahead window for s times. This resynchronization parameter, s, determines the tolerance level of being desynchronized. However, larger s values (better tolerance) come with a trade-off of higher computational needs and can be a source of malicious attacks. This paper introduces an improved method to the HOTP standard in order to increase the computational efficiency for a larger s window. The introduced method doubles the s window size through negligible computational overheads. Furthermore, the method described in this paper can be easily implemented in the current standard implementation of the HOTP standards. (5 pages)
随着从笔记本电脑到智能手机等移动无线设备的大量出现,一次性密码(OTP)机制用于身份验证变得越来越方便。OTP仅用于单次使用目的,通常按需生成,并且具有有限的可用保质期。一旦使用,该密码将在身份验证系统的客户端和服务器端同时失效。基于哈希消息认证码(HMAC)的OTP (HOTP)是一种流行的标准化OTP系统。在HOTP系统中,OTP是在客户端通过首先生成从共享密钥派生的加密密钥并增加计数器值来生成的。然后生成的最终值被截断为OTP所要求的位数。在服务器端,生成相同的计算,并比较生成的OTP以进行身份验证。无线环境中的信号中断可能导致需要在客户端重新生成新的OTP,从而导致动态计数器值与服务器不同步。如果在身份验证过程中发生不匹配,服务器将在预检窗口内增加计数器值5次。重同步参数s决定了被去同步的容忍度。然而,更大的s值(更好的容忍度)伴随着更高的计算需求,并且可能成为恶意攻击的来源。本文介绍了一种对HOTP标准的改进方法,以提高大s窗口下的计算效率。所介绍的方法通过可忽略不计的计算开销使窗口大小翻倍。此外,本文所描述的方法可以很容易地在当前的标准实现中实现HOTP标准。(5页)
{"title":"Improved look-ahead re-synchronization window for HMAC-based one-time password","authors":"Alireza Beikverdi, I. Tan","doi":"10.1049/cp.2012.2111","DOIUrl":"https://doi.org/10.1049/cp.2012.2111","url":null,"abstract":"With the abundance of mobile wireless devices ranging from notebooks to smart phones, it has become convenient for One-Time Passwords (OTP) mechanism to be used for authentication. OTP are generated for single use purposes only and are generally generated on demand and have a limited usable shelf life. Upon usage, the password will be invalidated on both the client and the server side of the authentication system. A popular and standardized OTP system is the Hashed Message Authentication Code (HMAC) Based OTP (HOTP). In the HOTP system, the OTP is generated on the client side by firstly generating an encryption key that is derived from a shared secret key and incrementing a counter value. The final value generated is then truncated to the number of digits as per required by the OTP. On the server side, the same computation is generated and the OTP generated are compared for authentication. Signal interruptions in wireless environments may cause the need to regenerate a new OTP on the client side and hence causes the dynamic counter value to be desynchronized with the server. In the event that a mismatch occurs during the authentication process, the server increases the counter value within a look-ahead window for s times. This resynchronization parameter, s, determines the tolerance level of being desynchronized. However, larger s values (better tolerance) come with a trade-off of higher computational needs and can be a source of malicious attacks. This paper introduces an improved method to the HOTP standard in order to increase the computational efficiency for a larger s window. The introduced method doubles the s window size through negligible computational overheads. Furthermore, the method described in this paper can be easily implemented in the current standard implementation of the HOTP standards. (5 pages)","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121811518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Joint carrier frequency offset and channel parameters estimation for MIMO-OFDM systems MIMO-OFDM系统的联合载波频偏和信道参数估计
Pub Date : 1900-01-01 DOI: 10.1049/cp.2012.2066
Meng-Chuan Mah, Heng-Siong Lim, A. Tan
Joint channel and frequency offset tracking based on an autoregressive (AR) model are often performed by either assuming the knowledge of the state transition matrix and state noise or obtaining the state transition matrix and state noise via the Yule Walker equations. In this paper, we propose a joint carrier frequency offset (CFO) and channel parameters tracking algorithm for MIMO-OFDM system which is capable of tracking the channel parameters without requirements of additional information such as maximum Doppler frequency and maximum delay spread. The Extended Kalman Filter is proposed for the joint tracking process. Simulation results show that the performance of the proposed method is close to the case when channel parameters are known. (6 pages)
基于自回归(AR)模型的联合信道和频偏跟踪通常通过假设状态转移矩阵和状态噪声的知识或通过Yule Walker方程获得状态转移矩阵和状态噪声来实现。本文提出了一种MIMO-OFDM系统载波频偏和信道参数联合跟踪算法,该算法能够在不需要最大多普勒频率和最大时延扩展等附加信息的情况下对信道参数进行跟踪。针对联合跟踪问题,提出了扩展卡尔曼滤波器。仿真结果表明,该方法的性能接近信道参数已知的情况。(6页)
{"title":"Joint carrier frequency offset and channel parameters estimation for MIMO-OFDM systems","authors":"Meng-Chuan Mah, Heng-Siong Lim, A. Tan","doi":"10.1049/cp.2012.2066","DOIUrl":"https://doi.org/10.1049/cp.2012.2066","url":null,"abstract":"Joint channel and frequency offset tracking based on an autoregressive (AR) model are often performed by either assuming the knowledge of the state transition matrix and state noise or obtaining the state transition matrix and state noise via the Yule Walker equations. In this paper, we propose a joint carrier frequency offset (CFO) and channel parameters tracking algorithm for MIMO-OFDM system which is capable of tracking the channel parameters without requirements of additional information such as maximum Doppler frequency and maximum delay spread. The Extended Kalman Filter is proposed for the joint tracking process. Simulation results show that the performance of the proposed method is close to the case when channel parameters are known. (6 pages)","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133259131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Real-time application session transfer over IP Multimedia Subsystem (IMS) network 通过IP多媒体子系统(IMS)网络实时传输应用会话
Pub Date : 1900-01-01 DOI: 10.1049/cp.2012.2088
C. Lee, K. Choong
Living in a world surrounded by multiple devices such as smart phone, laptop, desktop PC and even tablet, it is important for the user to seamlessly transfer his/her session across these devices in a ubiquitous manner according to user preferences. While most of the systems either rely on realtime location tracking of the target device, or require users to remember the contact or IP address of the target device for the transfer, we propose in this paper an automated session transfer mechanism leveraging on the registration information which are readily found in the IP Multimedia Subsystem (IMS) core. We explain in this paper the system architecture and signaling flow of our prototype implementation. Results showed that our proposed mechanism for session transfer over both wired and wireless access network took 202ms and 388ms respectively, which stays within the ITU-T recommendation of 150ms to 400ms overall delay. (4 pages)
生活在一个被智能手机、笔记本电脑、台式电脑甚至平板电脑等多种设备包围的世界中,对于用户来说,根据用户的偏好,以一种无处不在的方式无缝地在这些设备之间传输他/她的会话是很重要的。虽然大多数系统要么依赖于目标设备的实时位置跟踪,要么要求用户记住目标设备的联系方式或IP地址进行传输,但我们在本文中提出了一种利用IP多媒体子系统(IMS)核心中易于找到的注册信息的自动会话传输机制。在本文中,我们解释了我们的原型实现的系统架构和信令流程。结果表明,我们提出的有线和无线接入网会话传输机制分别为202ms和388ms,处于ITU-T建议的150ms至400ms的总延迟范围内。(4页)
{"title":"Real-time application session transfer over IP Multimedia Subsystem (IMS) network","authors":"C. Lee, K. Choong","doi":"10.1049/cp.2012.2088","DOIUrl":"https://doi.org/10.1049/cp.2012.2088","url":null,"abstract":"Living in a world surrounded by multiple devices such as smart phone, laptop, desktop PC and even tablet, it is important for the user to seamlessly transfer his/her session across these devices in a ubiquitous manner according to user preferences. While most of the systems either rely on realtime location tracking of the target device, or require users to remember the contact or IP address of the target device for the transfer, we propose in this paper an automated session transfer mechanism leveraging on the registration information which are readily found in the IP Multimedia Subsystem (IMS) core. We explain in this paper the system architecture and signaling flow of our prototype implementation. Results showed that our proposed mechanism for session transfer over both wired and wireless access network took 202ms and 388ms respectively, which stays within the ITU-T recommendation of 150ms to 400ms overall delay. (4 pages)","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128787472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interference analysis and reduction in cellular network 蜂窝网络中的干扰分析与减少
Pub Date : 1900-01-01 DOI: 10.1049/cp.2012.2078
Ashagrie Getnet Flattie
A fundamental problem in cellular network, as well as in many other disciplines (wireless communication), is finding a suitable interference reduction methods. Radio links cannot be created over infinite distances and will be limited in range by interference. In this study two special cases are considered: In the first scenario, varying the load factor and antenna tilt to reduce the Co-channel interference for GSM network and the second case optimizing the prediction model to minimized adjacent channel interference for WCDMA system has been addressed. The variability of different interference with the cellular system parameters has been investigated. The result shows that the ACI decreased (16%) after optimizing WINLOS models. The ACIR values reach 30 dB which is acceptable range to minimize the capacity loss. C/I  12 dB can be increased by 3% when changing mechanical tilt by 4 degree. All the interference reduction methods have an impact on the cell coverage area or capacity and therefore they need to be planned carefully. (6 pages)
蜂窝网络以及许多其他学科(无线通信)的一个基本问题是找到合适的干扰减少方法。无线电链路不能在无限的距离上建立,并且会受到干扰的限制。本研究考虑了两种特殊情况:第一种情况下,通过改变负载因子和天线倾斜来减少GSM网络的同信道干扰;第二种情况下,优化预测模型以最小化WCDMA系统的相邻信道干扰。研究了不同干扰对蜂窝系统参数的影响。结果表明,优化WINLOS模型后,ACI降低了16%。ACIR值达到30db,这是可以接受的范围,以尽量减少容量损失。C/I当改变机械倾斜4度时,12 dB可提高3%。所有减少干扰的方法都会影响到小区的覆盖面积或容量,因此需要仔细规划。(6页)
{"title":"Interference analysis and reduction in cellular network","authors":"Ashagrie Getnet Flattie","doi":"10.1049/cp.2012.2078","DOIUrl":"https://doi.org/10.1049/cp.2012.2078","url":null,"abstract":"A fundamental problem in cellular network, as well as in many other disciplines (wireless communication), is finding a suitable interference reduction methods. Radio links cannot be created over infinite distances and will be limited in range by interference. In this study two special cases are considered: In the first scenario, varying the load factor and antenna tilt to reduce the Co-channel interference for GSM network and the second case optimizing the prediction model to minimized adjacent channel interference for WCDMA system has been addressed. The variability of different interference with the cellular system parameters has been investigated. The result shows that the ACI decreased (16%) after optimizing WINLOS models. The ACIR values reach 30 dB which is acceptable range to minimize the capacity loss. C/I  12 dB can be increased by 3% when changing mechanical tilt by 4 degree. All the interference reduction methods have an impact on the cell coverage area or capacity and therefore they need to be planned carefully. (6 pages)","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133767697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Development of wireless Bluetooth heart rate remote monitoring system 无线蓝牙心率远程监测系统的研制
Pub Date : 1900-01-01 DOI: 10.1049/cp.2012.2101
Basem Abu Izneid, Ibrahim Sukar, Malek Ali, M. Souiyah
This paper presents design and development of a new heart rate remote monitoring device using Microcontroller and wireless Bluetooth that transmits and displays precise readings of the heart rate on laptop. However, the signal is basically the number of beats per minute of the heart and should be monitored from time to time to detect any abnormalities of the heart rate. This system consists of two phases; the integrated pulse rate measurement circuit to detect the pulses on the fingertip that include pulse detection, signal extraction, pulse amplification. Furthermore the microcontroller circuit which processes the detected signal via wireless Bluetooth device which is responsible of the heart rate transmitting readings. (4 pages)
本文介绍了一种新型的心率远程监测装置的设计和开发,该装置采用单片机和无线蓝牙技术,可以在笔记本电脑上传输和显示精确的心率读数。然而,信号基本上是心脏每分钟跳动的次数,应该不时监测,以发现心率的任何异常。该系统由两个阶段组成;该集成脉冲率测量电路用于检测指尖上的脉冲,包括脉冲检测、信号提取、脉冲放大。此外,微控制器电路通过无线蓝牙设备处理检测到的信号,负责心率传输读数。(4页)
{"title":"Development of wireless Bluetooth heart rate remote monitoring system","authors":"Basem Abu Izneid, Ibrahim Sukar, Malek Ali, M. Souiyah","doi":"10.1049/cp.2012.2101","DOIUrl":"https://doi.org/10.1049/cp.2012.2101","url":null,"abstract":"This paper presents design and development of a new heart rate remote monitoring device using Microcontroller and wireless Bluetooth that transmits and displays precise readings of the heart rate on laptop. However, the signal is basically the number of beats per minute of the heart and should be monitored from time to time to detect any abnormalities of the heart rate. This system consists of two phases; the integrated pulse rate measurement circuit to detect the pulses on the fingertip that include pulse detection, signal extraction, pulse amplification. Furthermore the microcontroller circuit which processes the detected signal via wireless Bluetooth device which is responsible of the heart rate transmitting readings. (4 pages)","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134554563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Latency evaluation of authentication protocols in centralized 802.11 architecture 集中式802.11体系结构中认证协议的延迟评估
Pub Date : 1900-01-01 DOI: 10.1049/cp.2012.2113
M. H. Mazlan, S. Ariffin, Mohammed Balfaqih, S. N. Hasnan, S. Haseeb
With the growing of telecommunication technology, people can connect to the Internet wirelessly anywhere and anytime. IEEE 802.11 Wireless Local Area Network (WLAN) became the preferred technology for providing Internet access in both indoors and outdoors environments for private and public usage. In order to establish the connection, users need to authenticate and associate with the Access Point (AP) to get access to the network. This was originally not a secured environment. For securing authentication process, many protocols had been introduced to protect the WLANs against unauthorized access from attackers. This paper aims to evaluate the performance of different authentication protocols in Centralized 802.11 Architecture by comparing the latency for Authentication and Association, 802.1x Authentication and Key Management phases. Experiments were performed on a centralized WLAN testbed consisting of Access Controller (AC), AP, RADIUS server and Client in neighbourhood AP environment. We analyse the authentication protocols in error free and error prone scenarios to study the effect of error during re-authentication process during handover. WPA2-Enterprise authentication methods cause the highest re-authentication latency compare with open-system authentication and WPA2-Personal authentication. In the re-authentication component for WPA2Enterprise, 802.1x authentication phase cause highest latency than authentication and association phase and key management phase. (6 pages)
随着电信技术的发展,人们可以随时随地无线上网。IEEE 802.11无线局域网(WLAN)成为在室内和室外环境中为私人和公共使用提供互联网接入的首选技术。为了建立连接,用户需要进行身份验证并与接入点(Access Point, AP)进行关联,才能访问网络。这原本不是一个安全的环境。为了确保身份验证过程的安全性,引入了许多协议来保护wlan免受攻击者的未经授权访问。本文旨在通过比较认证与关联、802.1x认证和密钥管理阶段的延迟来评估集中式802.11架构中不同认证协议的性能。实验在一个由接入控制器(AC)、AP、RADIUS服务器和客户端组成的集中WLAN测试平台上进行。通过对无错误和易出错场景下的认证协议进行分析,研究了切换过程中错误对重新认证过程的影响。与开放系统认证和wpa2 -个人认证相比,wpa2 -企业认证方式导致的重新认证延迟最高。在WPA2Enterprise的重新身份验证组件中,802.1x身份验证阶段比身份验证和关联阶段和密钥管理阶段造成的延迟最高。(6页)
{"title":"Latency evaluation of authentication protocols in centralized 802.11 architecture","authors":"M. H. Mazlan, S. Ariffin, Mohammed Balfaqih, S. N. Hasnan, S. Haseeb","doi":"10.1049/cp.2012.2113","DOIUrl":"https://doi.org/10.1049/cp.2012.2113","url":null,"abstract":"With the growing of telecommunication technology, people can connect to the Internet wirelessly anywhere and anytime. IEEE 802.11 Wireless Local Area Network (WLAN) became the preferred technology for providing Internet access in both indoors and outdoors environments for private and public usage. In order to establish the connection, users need to authenticate and associate with the Access Point (AP) to get access to the network. This was originally not a secured environment. For securing authentication process, many protocols had been introduced to protect the WLANs against unauthorized access from attackers. This paper aims to evaluate the performance of different authentication protocols in Centralized 802.11 Architecture by comparing the latency for Authentication and Association, 802.1x Authentication and Key Management phases. Experiments were performed on a centralized WLAN testbed consisting of Access Controller (AC), AP, RADIUS server and Client in neighbourhood AP environment. We analyse the authentication protocols in error free and error prone scenarios to study the effect of error during re-authentication process during handover. WPA2-Enterprise authentication methods cause the highest re-authentication latency compare with open-system authentication and WPA2-Personal authentication. In the re-authentication component for WPA2Enterprise, 802.1x authentication phase cause highest latency than authentication and association phase and key management phase. (6 pages)","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114406072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
UWB waveform set design using Löwdin's orthogonalization with Hermite Rodriguez functions UWB波形集设计使用Löwdin的正交与Hermite Rodriguez函数
Pub Date : 1900-01-01 DOI: 10.1049/cp.2012.2067
M. A. Yusoff, Z. Zang
In this paper we design a set of spectrally efficient orthogonal waveforms based on Hermite Rodriguez functions. The design is formulated as a semi-infinite quadratic programming problem and subsequently Lowdin method is used to generate a set of orthogonal waveforms. This approach is able to produce many overlapping orthogonal waveforms with high spectral efficiency. (4 pages)
本文设计了一组基于Hermite Rodriguez函数的频谱高效正交波形。该设计是一个半无限二次规划问题,随后采用洛丁法生成一组正交波形。这种方法可以产生许多重叠的正交波形,具有很高的频谱效率。(4页)
{"title":"UWB waveform set design using Löwdin's orthogonalization with Hermite Rodriguez functions","authors":"M. A. Yusoff, Z. Zang","doi":"10.1049/cp.2012.2067","DOIUrl":"https://doi.org/10.1049/cp.2012.2067","url":null,"abstract":"In this paper we design a set of spectrally efficient orthogonal waveforms based on Hermite Rodriguez functions. The design is formulated as a semi-infinite quadratic programming problem and subsequently Lowdin method is used to generate a set of orthogonal waveforms. This approach is able to produce many overlapping orthogonal waveforms with high spectral efficiency. (4 pages)","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123333460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An ns-3 HSPA network simulator with application to evaluating a base station removal algorithm 一个ns- 3hspa网络模拟器,用于评估一种基站移除算法
Pub Date : 1900-01-01 DOI: 10.1049/cp.2012.2080
Arash H. Matinrad, Vangelis Angelakis, D. Yuan
In this paper we present system modeling for HSPA networks, and the design and implementation of an ns-3 simulator for HSPA performance assessment. As a case study, the system model and simulator are integrated in the context of providing energy-saving solutions in cellular networks. Our simulator is a highly modular and scalable for studying how a given infrastructure deployment solution, along with its parameters and physical configuration characteristics, translates into the overall system performance. Based on HSPA system modeling, we introduce a simple, intuitive, and fast energy-saving algorithm for switching off NodeBs from a dense, low load system, subject to service coverage constraints. Numerical results demonstrate that the developed ns-3 HSPA system-level simulator is able to effectively deliver detailed HSPA performance assessment, and thereby enables accurate characterization of the performance trade-off of energy saving versus throughput and coverage. (6 pages)
本文介绍了HSPA网络的系统建模,以及用于HSPA性能评估的ns-3模拟器的设计和实现。作为一个案例研究,系统模型和模拟器在提供蜂窝网络节能解决方案的背景下集成。我们的模拟器是高度模块化和可扩展的,用于研究给定的基础设施部署解决方案及其参数和物理配置特征如何转化为整体系统性能。在HSPA系统建模的基础上,我们引入了一种简单、直观、快速的节能算法,用于在受服务覆盖限制的情况下,从密集、低负载的系统中关闭节点。数值结果表明,所开发的ns-3 HSPA系统级模拟器能够有效地提供详细的HSPA性能评估,从而能够准确表征节能与吞吐量和覆盖之间的性能权衡。(6页)
{"title":"An ns-3 HSPA network simulator with application to evaluating a base station removal algorithm","authors":"Arash H. Matinrad, Vangelis Angelakis, D. Yuan","doi":"10.1049/cp.2012.2080","DOIUrl":"https://doi.org/10.1049/cp.2012.2080","url":null,"abstract":"In this paper we present system modeling for HSPA networks, and the design and implementation of an ns-3 simulator for HSPA performance assessment. As a case study, the system model and simulator are integrated in the context of providing energy-saving solutions in cellular networks. Our simulator is a highly modular and scalable for studying how a given infrastructure deployment solution, along with its parameters and physical configuration characteristics, translates into the overall system performance. Based on HSPA system modeling, we introduce a simple, intuitive, and fast energy-saving algorithm for switching off NodeBs from a dense, low load system, subject to service coverage constraints. Numerical results demonstrate that the developed ns-3 HSPA system-level simulator is able to effectively deliver detailed HSPA performance assessment, and thereby enables accurate characterization of the performance trade-off of energy saving versus throughput and coverage. (6 pages)","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116644898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET International Conference on Wireless Communications and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1