In some wireless sensor network image processing applications, visual data such as the surveillance imagery or video streaming might contain high commercial value but devalues over time. For such multimedia, the security requirement is usually low or just sufficient to disguise and protect the value of the payload for a short-term period. Multimedia compression is a necessity for these large-sized data and the unification of security and compression properties would greatly increase the practicality of the image processing algorithm. In this paper, we are presenting the image results of using the BWCA (Burrow Wheeler Compression Algorithm) on images with the proposed conditional transposition methodology (keyed transpose) for a short-term visual protection and the results for subjective metric perceptual assessment of the quality and the BWT effects on the images. (6 pages)
{"title":"Image compression with short-term visual encryption using the burrow wheeler transform and keyed transpose","authors":"J. Kong, K. Seng, L. Yeong, L. Ang","doi":"10.1049/cp.2012.2112","DOIUrl":"https://doi.org/10.1049/cp.2012.2112","url":null,"abstract":"In some wireless sensor network image processing applications, visual data such as the surveillance imagery or video streaming might contain high commercial value but devalues over time. For such multimedia, the security requirement is usually low or just sufficient to disguise and protect the value of the payload for a short-term period. Multimedia compression is a necessity for these large-sized data and the unification of security and compression properties would greatly increase the practicality of the image processing algorithm. In this paper, we are presenting the image results of using the BWCA (Burrow Wheeler Compression Algorithm) on images with the proposed conditional transposition methodology (keyed transpose) for a short-term visual protection and the results for subjective metric perceptual assessment of the quality and the BWT effects on the images. (6 pages)","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126748725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the abundance of mobile wireless devices ranging from notebooks to smart phones, it has become convenient for One-Time Passwords (OTP) mechanism to be used for authentication. OTP are generated for single use purposes only and are generally generated on demand and have a limited usable shelf life. Upon usage, the password will be invalidated on both the client and the server side of the authentication system. A popular and standardized OTP system is the Hashed Message Authentication Code (HMAC) Based OTP (HOTP). In the HOTP system, the OTP is generated on the client side by firstly generating an encryption key that is derived from a shared secret key and incrementing a counter value. The final value generated is then truncated to the number of digits as per required by the OTP. On the server side, the same computation is generated and the OTP generated are compared for authentication. Signal interruptions in wireless environments may cause the need to regenerate a new OTP on the client side and hence causes the dynamic counter value to be desynchronized with the server. In the event that a mismatch occurs during the authentication process, the server increases the counter value within a look-ahead window for s times. This resynchronization parameter, s, determines the tolerance level of being desynchronized. However, larger s values (better tolerance) come with a trade-off of higher computational needs and can be a source of malicious attacks. This paper introduces an improved method to the HOTP standard in order to increase the computational efficiency for a larger s window. The introduced method doubles the s window size through negligible computational overheads. Furthermore, the method described in this paper can be easily implemented in the current standard implementation of the HOTP standards. (5 pages)
{"title":"Improved look-ahead re-synchronization window for HMAC-based one-time password","authors":"Alireza Beikverdi, I. Tan","doi":"10.1049/cp.2012.2111","DOIUrl":"https://doi.org/10.1049/cp.2012.2111","url":null,"abstract":"With the abundance of mobile wireless devices ranging from notebooks to smart phones, it has become convenient for One-Time Passwords (OTP) mechanism to be used for authentication. OTP are generated for single use purposes only and are generally generated on demand and have a limited usable shelf life. Upon usage, the password will be invalidated on both the client and the server side of the authentication system. A popular and standardized OTP system is the Hashed Message Authentication Code (HMAC) Based OTP (HOTP). In the HOTP system, the OTP is generated on the client side by firstly generating an encryption key that is derived from a shared secret key and incrementing a counter value. The final value generated is then truncated to the number of digits as per required by the OTP. On the server side, the same computation is generated and the OTP generated are compared for authentication. Signal interruptions in wireless environments may cause the need to regenerate a new OTP on the client side and hence causes the dynamic counter value to be desynchronized with the server. In the event that a mismatch occurs during the authentication process, the server increases the counter value within a look-ahead window for s times. This resynchronization parameter, s, determines the tolerance level of being desynchronized. However, larger s values (better tolerance) come with a trade-off of higher computational needs and can be a source of malicious attacks. This paper introduces an improved method to the HOTP standard in order to increase the computational efficiency for a larger s window. The introduced method doubles the s window size through negligible computational overheads. Furthermore, the method described in this paper can be easily implemented in the current standard implementation of the HOTP standards. (5 pages)","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121811518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Joint channel and frequency offset tracking based on an autoregressive (AR) model are often performed by either assuming the knowledge of the state transition matrix and state noise or obtaining the state transition matrix and state noise via the Yule Walker equations. In this paper, we propose a joint carrier frequency offset (CFO) and channel parameters tracking algorithm for MIMO-OFDM system which is capable of tracking the channel parameters without requirements of additional information such as maximum Doppler frequency and maximum delay spread. The Extended Kalman Filter is proposed for the joint tracking process. Simulation results show that the performance of the proposed method is close to the case when channel parameters are known. (6 pages)
{"title":"Joint carrier frequency offset and channel parameters estimation for MIMO-OFDM systems","authors":"Meng-Chuan Mah, Heng-Siong Lim, A. Tan","doi":"10.1049/cp.2012.2066","DOIUrl":"https://doi.org/10.1049/cp.2012.2066","url":null,"abstract":"Joint channel and frequency offset tracking based on an autoregressive (AR) model are often performed by either assuming the knowledge of the state transition matrix and state noise or obtaining the state transition matrix and state noise via the Yule Walker equations. In this paper, we propose a joint carrier frequency offset (CFO) and channel parameters tracking algorithm for MIMO-OFDM system which is capable of tracking the channel parameters without requirements of additional information such as maximum Doppler frequency and maximum delay spread. The Extended Kalman Filter is proposed for the joint tracking process. Simulation results show that the performance of the proposed method is close to the case when channel parameters are known. (6 pages)","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133259131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Living in a world surrounded by multiple devices such as smart phone, laptop, desktop PC and even tablet, it is important for the user to seamlessly transfer his/her session across these devices in a ubiquitous manner according to user preferences. While most of the systems either rely on realtime location tracking of the target device, or require users to remember the contact or IP address of the target device for the transfer, we propose in this paper an automated session transfer mechanism leveraging on the registration information which are readily found in the IP Multimedia Subsystem (IMS) core. We explain in this paper the system architecture and signaling flow of our prototype implementation. Results showed that our proposed mechanism for session transfer over both wired and wireless access network took 202ms and 388ms respectively, which stays within the ITU-T recommendation of 150ms to 400ms overall delay. (4 pages)
{"title":"Real-time application session transfer over IP Multimedia Subsystem (IMS) network","authors":"C. Lee, K. Choong","doi":"10.1049/cp.2012.2088","DOIUrl":"https://doi.org/10.1049/cp.2012.2088","url":null,"abstract":"Living in a world surrounded by multiple devices such as smart phone, laptop, desktop PC and even tablet, it is important for the user to seamlessly transfer his/her session across these devices in a ubiquitous manner according to user preferences. While most of the systems either rely on realtime location tracking of the target device, or require users to remember the contact or IP address of the target device for the transfer, we propose in this paper an automated session transfer mechanism leveraging on the registration information which are readily found in the IP Multimedia Subsystem (IMS) core. We explain in this paper the system architecture and signaling flow of our prototype implementation. Results showed that our proposed mechanism for session transfer over both wired and wireless access network took 202ms and 388ms respectively, which stays within the ITU-T recommendation of 150ms to 400ms overall delay. (4 pages)","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128787472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A fundamental problem in cellular network, as well as in many other disciplines (wireless communication), is finding a suitable interference reduction methods. Radio links cannot be created over infinite distances and will be limited in range by interference. In this study two special cases are considered: In the first scenario, varying the load factor and antenna tilt to reduce the Co-channel interference for GSM network and the second case optimizing the prediction model to minimized adjacent channel interference for WCDMA system has been addressed. The variability of different interference with the cellular system parameters has been investigated. The result shows that the ACI decreased (16%) after optimizing WINLOS models. The ACIR values reach 30 dB which is acceptable range to minimize the capacity loss. C/I 12 dB can be increased by 3% when changing mechanical tilt by 4 degree. All the interference reduction methods have an impact on the cell coverage area or capacity and therefore they need to be planned carefully. (6 pages)
{"title":"Interference analysis and reduction in cellular network","authors":"Ashagrie Getnet Flattie","doi":"10.1049/cp.2012.2078","DOIUrl":"https://doi.org/10.1049/cp.2012.2078","url":null,"abstract":"A fundamental problem in cellular network, as well as in many other disciplines (wireless communication), is finding a suitable interference reduction methods. Radio links cannot be created over infinite distances and will be limited in range by interference. In this study two special cases are considered: In the first scenario, varying the load factor and antenna tilt to reduce the Co-channel interference for GSM network and the second case optimizing the prediction model to minimized adjacent channel interference for WCDMA system has been addressed. The variability of different interference with the cellular system parameters has been investigated. The result shows that the ACI decreased (16%) after optimizing WINLOS models. The ACIR values reach 30 dB which is acceptable range to minimize the capacity loss. C/I 12 dB can be increased by 3% when changing mechanical tilt by 4 degree. All the interference reduction methods have an impact on the cell coverage area or capacity and therefore they need to be planned carefully. (6 pages)","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133767697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Basem Abu Izneid, Ibrahim Sukar, Malek Ali, M. Souiyah
This paper presents design and development of a new heart rate remote monitoring device using Microcontroller and wireless Bluetooth that transmits and displays precise readings of the heart rate on laptop. However, the signal is basically the number of beats per minute of the heart and should be monitored from time to time to detect any abnormalities of the heart rate. This system consists of two phases; the integrated pulse rate measurement circuit to detect the pulses on the fingertip that include pulse detection, signal extraction, pulse amplification. Furthermore the microcontroller circuit which processes the detected signal via wireless Bluetooth device which is responsible of the heart rate transmitting readings. (4 pages)
{"title":"Development of wireless Bluetooth heart rate remote monitoring system","authors":"Basem Abu Izneid, Ibrahim Sukar, Malek Ali, M. Souiyah","doi":"10.1049/cp.2012.2101","DOIUrl":"https://doi.org/10.1049/cp.2012.2101","url":null,"abstract":"This paper presents design and development of a new heart rate remote monitoring device using Microcontroller and wireless Bluetooth that transmits and displays precise readings of the heart rate on laptop. However, the signal is basically the number of beats per minute of the heart and should be monitored from time to time to detect any abnormalities of the heart rate. This system consists of two phases; the integrated pulse rate measurement circuit to detect the pulses on the fingertip that include pulse detection, signal extraction, pulse amplification. Furthermore the microcontroller circuit which processes the detected signal via wireless Bluetooth device which is responsible of the heart rate transmitting readings. (4 pages)","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134554563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. H. Mazlan, S. Ariffin, Mohammed Balfaqih, S. N. Hasnan, S. Haseeb
With the growing of telecommunication technology, people can connect to the Internet wirelessly anywhere and anytime. IEEE 802.11 Wireless Local Area Network (WLAN) became the preferred technology for providing Internet access in both indoors and outdoors environments for private and public usage. In order to establish the connection, users need to authenticate and associate with the Access Point (AP) to get access to the network. This was originally not a secured environment. For securing authentication process, many protocols had been introduced to protect the WLANs against unauthorized access from attackers. This paper aims to evaluate the performance of different authentication protocols in Centralized 802.11 Architecture by comparing the latency for Authentication and Association, 802.1x Authentication and Key Management phases. Experiments were performed on a centralized WLAN testbed consisting of Access Controller (AC), AP, RADIUS server and Client in neighbourhood AP environment. We analyse the authentication protocols in error free and error prone scenarios to study the effect of error during re-authentication process during handover. WPA2-Enterprise authentication methods cause the highest re-authentication latency compare with open-system authentication and WPA2-Personal authentication. In the re-authentication component for WPA2Enterprise, 802.1x authentication phase cause highest latency than authentication and association phase and key management phase. (6 pages)
随着电信技术的发展,人们可以随时随地无线上网。IEEE 802.11无线局域网(WLAN)成为在室内和室外环境中为私人和公共使用提供互联网接入的首选技术。为了建立连接,用户需要进行身份验证并与接入点(Access Point, AP)进行关联,才能访问网络。这原本不是一个安全的环境。为了确保身份验证过程的安全性,引入了许多协议来保护wlan免受攻击者的未经授权访问。本文旨在通过比较认证与关联、802.1x认证和密钥管理阶段的延迟来评估集中式802.11架构中不同认证协议的性能。实验在一个由接入控制器(AC)、AP、RADIUS服务器和客户端组成的集中WLAN测试平台上进行。通过对无错误和易出错场景下的认证协议进行分析,研究了切换过程中错误对重新认证过程的影响。与开放系统认证和wpa2 -个人认证相比,wpa2 -企业认证方式导致的重新认证延迟最高。在WPA2Enterprise的重新身份验证组件中,802.1x身份验证阶段比身份验证和关联阶段和密钥管理阶段造成的延迟最高。(6页)
{"title":"Latency evaluation of authentication protocols in centralized 802.11 architecture","authors":"M. H. Mazlan, S. Ariffin, Mohammed Balfaqih, S. N. Hasnan, S. Haseeb","doi":"10.1049/cp.2012.2113","DOIUrl":"https://doi.org/10.1049/cp.2012.2113","url":null,"abstract":"With the growing of telecommunication technology, people can connect to the Internet wirelessly anywhere and anytime. IEEE 802.11 Wireless Local Area Network (WLAN) became the preferred technology for providing Internet access in both indoors and outdoors environments for private and public usage. In order to establish the connection, users need to authenticate and associate with the Access Point (AP) to get access to the network. This was originally not a secured environment. For securing authentication process, many protocols had been introduced to protect the WLANs against unauthorized access from attackers. This paper aims to evaluate the performance of different authentication protocols in Centralized 802.11 Architecture by comparing the latency for Authentication and Association, 802.1x Authentication and Key Management phases. Experiments were performed on a centralized WLAN testbed consisting of Access Controller (AC), AP, RADIUS server and Client in neighbourhood AP environment. We analyse the authentication protocols in error free and error prone scenarios to study the effect of error during re-authentication process during handover. WPA2-Enterprise authentication methods cause the highest re-authentication latency compare with open-system authentication and WPA2-Personal authentication. In the re-authentication component for WPA2Enterprise, 802.1x authentication phase cause highest latency than authentication and association phase and key management phase. (6 pages)","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114406072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we design a set of spectrally efficient orthogonal waveforms based on Hermite Rodriguez functions. The design is formulated as a semi-infinite quadratic programming problem and subsequently Lowdin method is used to generate a set of orthogonal waveforms. This approach is able to produce many overlapping orthogonal waveforms with high spectral efficiency. (4 pages)
{"title":"UWB waveform set design using Löwdin's orthogonalization with Hermite Rodriguez functions","authors":"M. A. Yusoff, Z. Zang","doi":"10.1049/cp.2012.2067","DOIUrl":"https://doi.org/10.1049/cp.2012.2067","url":null,"abstract":"In this paper we design a set of spectrally efficient orthogonal waveforms based on Hermite Rodriguez functions. The design is formulated as a semi-infinite quadratic programming problem and subsequently Lowdin method is used to generate a set of orthogonal waveforms. This approach is able to produce many overlapping orthogonal waveforms with high spectral efficiency. (4 pages)","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123333460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we present system modeling for HSPA networks, and the design and implementation of an ns-3 simulator for HSPA performance assessment. As a case study, the system model and simulator are integrated in the context of providing energy-saving solutions in cellular networks. Our simulator is a highly modular and scalable for studying how a given infrastructure deployment solution, along with its parameters and physical configuration characteristics, translates into the overall system performance. Based on HSPA system modeling, we introduce a simple, intuitive, and fast energy-saving algorithm for switching off NodeBs from a dense, low load system, subject to service coverage constraints. Numerical results demonstrate that the developed ns-3 HSPA system-level simulator is able to effectively deliver detailed HSPA performance assessment, and thereby enables accurate characterization of the performance trade-off of energy saving versus throughput and coverage. (6 pages)
{"title":"An ns-3 HSPA network simulator with application to evaluating a base station removal algorithm","authors":"Arash H. Matinrad, Vangelis Angelakis, D. Yuan","doi":"10.1049/cp.2012.2080","DOIUrl":"https://doi.org/10.1049/cp.2012.2080","url":null,"abstract":"In this paper we present system modeling for HSPA networks, and the design and implementation of an ns-3 simulator for HSPA performance assessment. As a case study, the system model and simulator are integrated in the context of providing energy-saving solutions in cellular networks. Our simulator is a highly modular and scalable for studying how a given infrastructure deployment solution, along with its parameters and physical configuration characteristics, translates into the overall system performance. Based on HSPA system modeling, we introduce a simple, intuitive, and fast energy-saving algorithm for switching off NodeBs from a dense, low load system, subject to service coverage constraints. Numerical results demonstrate that the developed ns-3 HSPA system-level simulator is able to effectively deliver detailed HSPA performance assessment, and thereby enables accurate characterization of the performance trade-off of energy saving versus throughput and coverage. (6 pages)","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116644898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}