首页 > 最新文献

2015 International Conference on Wireless Networks and Mobile Communications (WINCOM)最新文献

英文 中文
New collaborative intrusion detection architecture based on multi agent systems 基于多智能体系统的新型协同入侵检测体系结构
Pub Date : 2015-10-01 DOI: 10.1109/WINCOM.2015.7381338
M. E. Ajjouri, S. Benhadou, H. Medromi
The Intrusion Detection System architectures used in commercial and research systems have a number of problems that limit their configurability. An important problem of agents: learning is not used. The concept of learning in existing IDSs used in general to learn the normal behavior of the system to secure. Thus, the IDS does not have the ability to detect new attacks. We propose in this paper a new architecture for intrusion detection based in multi agent systems adding a learning feature abnormal behaviors that correspond to new attack patterns. We present the motivation and description of the approach, for the detection step, the approach adopted is based on the technique of Case-Based Reasoning (CBR). The proposed architecture is based on a hierarchical and distributed strategy separated into three layers. We focus after on the modeling of our Multi agent systems Architecture, for reasons of simplicity, we use the methodology O-MaSE.
商业和研究系统中使用的入侵检测系统架构存在许多限制其可配置性的问题。智能体的一个重要问题是:学习没有用。学习的概念在现有的ids中一般用于学习系统的正常行为以确保安全。因此,IDS不具备检测新攻击的能力。本文提出了一种新的基于多智能体系统的入侵检测体系结构,该体系结构增加了一个学习特征,即与新的攻击模式相对应的异常行为。给出了该方法的动机和描述,在检测步骤中,采用基于案例推理(Case-Based Reasoning, CBR)的方法。所提出的体系结构基于分层和分布式策略,分为三层。之后,我们将重点放在多代理系统体系结构的建模上,为了简单起见,我们使用了O-MaSE方法。
{"title":"New collaborative intrusion detection architecture based on multi agent systems","authors":"M. E. Ajjouri, S. Benhadou, H. Medromi","doi":"10.1109/WINCOM.2015.7381338","DOIUrl":"https://doi.org/10.1109/WINCOM.2015.7381338","url":null,"abstract":"The Intrusion Detection System architectures used in commercial and research systems have a number of problems that limit their configurability. An important problem of agents: learning is not used. The concept of learning in existing IDSs used in general to learn the normal behavior of the system to secure. Thus, the IDS does not have the ability to detect new attacks. We propose in this paper a new architecture for intrusion detection based in multi agent systems adding a learning feature abnormal behaviors that correspond to new attack patterns. We present the motivation and description of the approach, for the detection step, the approach adopted is based on the technique of Case-Based Reasoning (CBR). The proposed architecture is based on a hierarchical and distributed strategy separated into three layers. We focus after on the modeling of our Multi agent systems Architecture, for reasons of simplicity, we use the methodology O-MaSE.","PeriodicalId":389513,"journal":{"name":"2015 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116708225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Wireless operator strategies in emerging markets: Strategic options and directions 新兴市场的无线运营商战略:战略选择和方向
Pub Date : 2015-10-01 DOI: 10.1109/WINCOM.2015.7381340
Hind Khyati
Wireless technologies and services in emerging markets have been central to enabling the communications explosion over the last decade that has, in many ways, revolutionized the lives and the economies of the people living there. The nature of the markets and the competitive dynamics in these regions are undergoing some delicate but very important shifts. This white paper analyzes the leading opportunities and challenges facing service providers in the wireless sector of emerging markets. It provides a clear view of the strategic options and directions required of wireless service providers - both communications service providers (CSPs) and mobile network operators (MNOs) - in an increasingly demanding ecosystem and insights into how they can profitably unlock a larger share of the customer wallet.
在过去十年中,新兴市场的无线技术和服务一直是实现通信爆炸式增长的核心,从许多方面来说,这种爆炸式增长彻底改变了生活在那里的人们的生活和经济。这些地区的市场性质和竞争动态正在发生一些微妙但非常重要的变化。本白皮书分析了新兴市场无线领域服务提供商面临的主要机遇和挑战。它为无线服务提供商(包括通信服务提供商(csp)和移动网络运营商(mno))在日益苛刻的生态系统中所需要的战略选择和方向提供了清晰的视角,并深入了解了他们如何才能获得更大的客户钱包份额。
{"title":"Wireless operator strategies in emerging markets: Strategic options and directions","authors":"Hind Khyati","doi":"10.1109/WINCOM.2015.7381340","DOIUrl":"https://doi.org/10.1109/WINCOM.2015.7381340","url":null,"abstract":"Wireless technologies and services in emerging markets have been central to enabling the communications explosion over the last decade that has, in many ways, revolutionized the lives and the economies of the people living there. The nature of the markets and the competitive dynamics in these regions are undergoing some delicate but very important shifts. This white paper analyzes the leading opportunities and challenges facing service providers in the wireless sector of emerging markets. It provides a clear view of the strategic options and directions required of wireless service providers - both communications service providers (CSPs) and mobile network operators (MNOs) - in an increasingly demanding ecosystem and insights into how they can profitably unlock a larger share of the customer wallet.","PeriodicalId":389513,"journal":{"name":"2015 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121725173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SKEP: A secret key exchange protocol using physiological signals in wireless body area networks SKEP:在无线体域网络中使用生理信号的秘密密钥交换协议
Pub Date : 2015-10-01 DOI: 10.1109/WINCOM.2015.7381317
Najeh Jamali, L. Chaari
The convergence of telecommunication technologies and the miniaturization of the electromechanical allowed an evolution proved in the world of wireless networks. This evolution is characterized by the emergence of a new generation of wireless personnel networks termed wireless body area networks (WBAN) that manages the human body functions. However, this technology has many requirements yet to be resolved. Security is the main challenge for this type of networks. In this paper, we propose a secret key exchange protocol using physiological signals in wireless body area networks (SKEP). This scheme allows a secure inter-sensor communication basing on physiological signals of the human body using cubic spline interpolation technique. Security analysis prove that our protocol guarantee data confidentiality and integrity in comparison with the previous protocol termed an efficient and secure key agreement scheme using physiological signals in body area networks.
电信技术的融合和机电设备的小型化使得无线网络世界的发展得到了证明。这种演变的特点是新一代无线人员网络的出现,称为无线身体区域网络(WBAN),用于管理人体功能。然而,这项技术有许多要求尚未解决。安全性是这类网络面临的主要挑战。本文提出了一种利用生理信号在无线体域网络(SKEP)中进行密钥交换的协议。该方案利用三次样条插值技术,实现了基于人体生理信号的传感器间安全通信。安全性分析表明,与之前的协议相比,我们的协议保证了数据的保密性和完整性,是一种在身体区域网络中利用生理信号的高效、安全的密钥协议方案。
{"title":"SKEP: A secret key exchange protocol using physiological signals in wireless body area networks","authors":"Najeh Jamali, L. Chaari","doi":"10.1109/WINCOM.2015.7381317","DOIUrl":"https://doi.org/10.1109/WINCOM.2015.7381317","url":null,"abstract":"The convergence of telecommunication technologies and the miniaturization of the electromechanical allowed an evolution proved in the world of wireless networks. This evolution is characterized by the emergence of a new generation of wireless personnel networks termed wireless body area networks (WBAN) that manages the human body functions. However, this technology has many requirements yet to be resolved. Security is the main challenge for this type of networks. In this paper, we propose a secret key exchange protocol using physiological signals in wireless body area networks (SKEP). This scheme allows a secure inter-sensor communication basing on physiological signals of the human body using cubic spline interpolation technique. Security analysis prove that our protocol guarantee data confidentiality and integrity in comparison with the previous protocol termed an efficient and secure key agreement scheme using physiological signals in body area networks.","PeriodicalId":389513,"journal":{"name":"2015 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126112327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A novel semi-analytical performance evaluation for a digital communication system using orthogonal series 基于正交级数的数字通信系统半解析性能评价方法
Pub Date : 2015-10-01 DOI: 10.1109/WINCOM.2015.7381335
Mohamed Et-tolba, N. Tahiri, Nissrine Mahir
Error probability is the most popular metric for evaluating the performance of a digital communication system. It is often estimated using Monte-Carlo simulation method since analytical expressions of the error probabilities are not always available especially for advanced communication systems. In this paper, we propose a new semi-analytical method for fast performance evaluation. This method is based on estimating the probability density using orthogonal series. We show that the proposed technique requires a few numbers of observation samples for performance evaluation compared with Monte-Carlo simulation. Consequently, it provides a significant gain in terms of computing time.
错误概率是评价数字通信系统性能最常用的指标。由于误差概率的解析表达式并不总是可用的,特别是对于先进的通信系统,通常使用蒙特卡罗模拟方法来估计。在本文中,我们提出了一种新的快速性能评估的半解析方法。该方法基于正交序列估计概率密度。结果表明,与蒙特卡罗模拟相比,该方法只需要少量的观察样本进行性能评估。因此,它在计算时间方面提供了显著的增益。
{"title":"A novel semi-analytical performance evaluation for a digital communication system using orthogonal series","authors":"Mohamed Et-tolba, N. Tahiri, Nissrine Mahir","doi":"10.1109/WINCOM.2015.7381335","DOIUrl":"https://doi.org/10.1109/WINCOM.2015.7381335","url":null,"abstract":"Error probability is the most popular metric for evaluating the performance of a digital communication system. It is often estimated using Monte-Carlo simulation method since analytical expressions of the error probabilities are not always available especially for advanced communication systems. In this paper, we propose a new semi-analytical method for fast performance evaluation. This method is based on estimating the probability density using orthogonal series. We show that the proposed technique requires a few numbers of observation samples for performance evaluation compared with Monte-Carlo simulation. Consequently, it provides a significant gain in terms of computing time.","PeriodicalId":389513,"journal":{"name":"2015 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121116590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Roadmap towards beyond 4G: Key technologies and challenges for 5G 超越4G的路线图:5G的关键技术和挑战
Pub Date : 2015-10-01 DOI: 10.1109/WINCOM.2015.7381324
S. E. Hassani, A. Haidine
5G are being intensively studied in order to deliver systems by 2020. This paper presents technological challenges and perspectives beyond 4G systems. It addresses the research landscape of 5G systems and the requirements to be fullfilled. It also presents some key technologies driving 5G development in order to give form to the future generation mobile systems.
5G正在深入研究,以便在2020年之前交付系统。本文介绍了4G系统之外的技术挑战和前景。它阐述了5G系统的研究前景和需要满足的需求。并介绍了推动5G发展的一些关键技术,为下一代移动系统的形成奠定基础。
{"title":"Roadmap towards beyond 4G: Key technologies and challenges for 5G","authors":"S. E. Hassani, A. Haidine","doi":"10.1109/WINCOM.2015.7381324","DOIUrl":"https://doi.org/10.1109/WINCOM.2015.7381324","url":null,"abstract":"5G are being intensively studied in order to deliver systems by 2020. This paper presents technological challenges and perspectives beyond 4G systems. It addresses the research landscape of 5G systems and the requirements to be fullfilled. It also presents some key technologies driving 5G development in order to give form to the future generation mobile systems.","PeriodicalId":389513,"journal":{"name":"2015 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131432786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Managing cloud-generated logs using big data technologies 使用大数据技术管理云生成的日志
Pub Date : 2015-10-01 DOI: 10.1109/WINCOM.2015.7381334
M. Lemoudden, B. E. Ouahidi
Cloud computing is a fast-growing paradigm that has forcefully emerged and established itself in the next generation of IT industry and business, performing massive-scale and complex computing. As cloud technology adoption continues to progress, massive growth in the scale of data generated through cloud computing has been observed. A large part of that data has been machine-generated log data; it is generated at every layer and component within the cloud information technology ecosystem that spans a range of IT functions from storage and computation to networking and application services. Log files are essential for enterprise-level monitoring, troubleshooting, security, debugging, compliance, etc. We argue that cloud computing is in need of a new methodology for recording, managing, storing and analyzing the log data that is generated by the cloud infrastructure, based on big data technologies, allowing for the access to a wealth of knowledge that can contribute to its own advancement. Our paper discusses and expands existing standard log management solutions to design new methods of exploiting the unstructured log data in order to gain unprecedented insights.
云计算是一种快速发展的范式,它在下一代IT行业和业务中强势崛起并确立了自己的地位,执行大规模和复杂的计算。随着云技术的不断发展,通过云计算产生的数据规模出现了大规模增长。其中很大一部分数据是机器生成的日志数据;它产生于云信息技术生态系统中的每一层和组件,该生态系统涵盖了从存储和计算到网络和应用服务的一系列it功能。日志文件对于企业级监视、故障排除、安全性、调试、遵从性等都是必不可少的。我们认为,云计算需要一种新的方法来记录、管理、存储和分析由云基础设施生成的日志数据,基于大数据技术,允许访问丰富的知识,可以促进其自身的进步。本文讨论并扩展了现有的标准日志管理解决方案,设计了利用非结构化日志数据的新方法,以获得前所未有的见解。
{"title":"Managing cloud-generated logs using big data technologies","authors":"M. Lemoudden, B. E. Ouahidi","doi":"10.1109/WINCOM.2015.7381334","DOIUrl":"https://doi.org/10.1109/WINCOM.2015.7381334","url":null,"abstract":"Cloud computing is a fast-growing paradigm that has forcefully emerged and established itself in the next generation of IT industry and business, performing massive-scale and complex computing. As cloud technology adoption continues to progress, massive growth in the scale of data generated through cloud computing has been observed. A large part of that data has been machine-generated log data; it is generated at every layer and component within the cloud information technology ecosystem that spans a range of IT functions from storage and computation to networking and application services. Log files are essential for enterprise-level monitoring, troubleshooting, security, debugging, compliance, etc. We argue that cloud computing is in need of a new methodology for recording, managing, storing and analyzing the log data that is generated by the cloud infrastructure, based on big data technologies, allowing for the access to a wealth of knowledge that can contribute to its own advancement. Our paper discusses and expands existing standard log management solutions to design new methods of exploiting the unstructured log data in order to gain unprecedented insights.","PeriodicalId":389513,"journal":{"name":"2015 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128116332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Literature survey on dynamic community detection and models of social networks 动态社区检测与社会网络模型的文献综述
Pub Date : 2015-10-01 DOI: 10.1109/WINCOM.2015.7381332
Imane Tamimi, Mohamed El-Kamili
In this paper, we realize a literature survey on the issue of community detection over time, first we present some basic concepts about networks modeled as graphs, then we state in an non exhaustive way the research fields arising from social networks. We present some of the existing models and methods to track communities over time. Community detection in networks is a prevailing subject in the area of social network analysis. There exist numerous methods and algorithms in the literature that have been dealing with that issue.
在本文中,我们对长期以来社区检测问题进行了文献综述,首先我们提出了一些关于网络建模为图的基本概念,然后我们以一种非详尽的方式陈述了社交网络所产生的研究领域。我们介绍了一些现有的模型和方法来跟踪社区。网络中的社区检测是社会网络分析领域的一个热门课题。文献中有许多方法和算法一直在处理这个问题。
{"title":"Literature survey on dynamic community detection and models of social networks","authors":"Imane Tamimi, Mohamed El-Kamili","doi":"10.1109/WINCOM.2015.7381332","DOIUrl":"https://doi.org/10.1109/WINCOM.2015.7381332","url":null,"abstract":"In this paper, we realize a literature survey on the issue of community detection over time, first we present some basic concepts about networks modeled as graphs, then we state in an non exhaustive way the research fields arising from social networks. We present some of the existing models and methods to track communities over time. Community detection in networks is a prevailing subject in the area of social network analysis. There exist numerous methods and algorithms in the literature that have been dealing with that issue.","PeriodicalId":389513,"journal":{"name":"2015 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"50 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120883709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance assessment of the routing protocol for low power and lossy networks 低功耗损耗网络中路由协议的性能评估
Pub Date : 2015-10-01 DOI: 10.1109/WINCOM.2015.7381329
Hanane Lamaazi, N. Benamar, M. Imaduddin, A. Jara
RPL (IPv6 Routing Protocol for Low Power and Lossy Networks) is proposed by the ROLL working group at IETF. This protocol used in the Internet of Things is optimal for Low power and Lossy Networks (LLNs). However, the RPL network has some limits when the network is dense. In this paper we evaluate the performance of RPL in three different scenarios. We first, evaluate the characteristics of RPL with fixed nodes, (one sink and others are senders). Then we add mobility, and we compare mobile nodes to fixed nodes in order to show how mobility can influence protocol parameters. Finally, we study the behavior of RPL when the network is dense in order to assess the protocol performances. In this study, we use Contiki OS and Cooja software for all simulations. The results show that RPL performances are greatly influenced by the number of nodes, type of mobility and the topology of the network. When the number of nodes increases, all metrics increase too, especially the power consumption which arrives until an augmentation of 52,85%. Furthermore, Random Waypoint Mobility Model (RWP) gives better metrics than Random Walk (RWK) Mobility Model in terms of number of hops and Expected Transmission (ETX) value. Also, in RWP model, nodes consume 10,73% of power than RWK. Our simulations show clearly that the power consumption is directly related to the number of sink nodes in the network. The more this type of node is present in the network the less power is consumed. The power reduction may occur till 5%.
RPL (IPv6 Routing Protocol for Low Power and Lossy Networks)是由IETF的ROLL工作组提出的。物联网中使用的该协议最适合低功耗和有损网络(lln)。但是,在网络密度较大的情况下,RPL网络存在一定的局限性。在本文中,我们评估了RPL在三种不同场景下的性能。首先,我们评估了具有固定节点的RPL的特性(一个接收节点和其他发送节点)。然后我们加入移动性,并将移动节点与固定节点进行比较,以显示移动性如何影响协议参数。最后,我们研究了RPL在网络密度较大时的行为,以评估协议的性能。在本研究中,我们使用Contiki OS和Cooja软件进行所有模拟。结果表明,RPL性能受节点数量、移动类型和网络拓扑结构的影响较大。当节点数量增加时,所有指标也会增加,特别是功耗,直到增加52,85%。此外,随机路径点移动模型(RWP)在跳数和期望传输(ETX)值方面提供了比随机行走(RWK)移动模型更好的指标。在RWP模型中,节点功耗比RWK模型低10.73%。我们的模拟清楚地表明,功耗与网络中汇聚节点的数量直接相关。这种类型的节点在网络中出现的越多,所消耗的功率就越少。功率下降可能会持续到5%。
{"title":"Performance assessment of the routing protocol for low power and lossy networks","authors":"Hanane Lamaazi, N. Benamar, M. Imaduddin, A. Jara","doi":"10.1109/WINCOM.2015.7381329","DOIUrl":"https://doi.org/10.1109/WINCOM.2015.7381329","url":null,"abstract":"RPL (IPv6 Routing Protocol for Low Power and Lossy Networks) is proposed by the ROLL working group at IETF. This protocol used in the Internet of Things is optimal for Low power and Lossy Networks (LLNs). However, the RPL network has some limits when the network is dense. In this paper we evaluate the performance of RPL in three different scenarios. We first, evaluate the characteristics of RPL with fixed nodes, (one sink and others are senders). Then we add mobility, and we compare mobile nodes to fixed nodes in order to show how mobility can influence protocol parameters. Finally, we study the behavior of RPL when the network is dense in order to assess the protocol performances. In this study, we use Contiki OS and Cooja software for all simulations. The results show that RPL performances are greatly influenced by the number of nodes, type of mobility and the topology of the network. When the number of nodes increases, all metrics increase too, especially the power consumption which arrives until an augmentation of 52,85%. Furthermore, Random Waypoint Mobility Model (RWP) gives better metrics than Random Walk (RWK) Mobility Model in terms of number of hops and Expected Transmission (ETX) value. Also, in RWP model, nodes consume 10,73% of power than RWK. Our simulations show clearly that the power consumption is directly related to the number of sink nodes in the network. The more this type of node is present in the network the less power is consumed. The power reduction may occur till 5%.","PeriodicalId":389513,"journal":{"name":"2015 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127382796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Closed-form performance analysis of generalized M-QAM over multihop weibull fading channels 广义M-QAM在多跳威布尔衰落信道上的封闭性能分析
Pub Date : 2015-10-01 DOI: 10.1109/WINCOM.2015.7381309
A. Soulimani, M. Benjillali
In this paper, we present a closed-form performance analysis of multihop cooperative schemes in the context of the global effort towards the design of future 5G systems. We adopt the advocated Weibull channel fading model for its flexible ability to cover different channel conditions, and supported by many recent measurement campaigns in various emerging 5G scenarios. The analyzed scheme consists of multiple "Detect-and-Forward" relays with generalized high-order M-QAM transmissions. The end-to-end performance of the multihop communication is evaluated in terms of the outage probability, bit error rate, and ergodic capacity. For all these metrics, we present exact closed-form expressions, some in terms of the Meijer's G-function. Numerical results illustrate the analysis, and Monte-Carlo simulations assess the accuracy of our obtained results for different system and channel parameters.
在本文中,我们在全球努力设计未来5G系统的背景下,对多跳合作方案进行了封闭式性能分析。我们采用了威布尔信道衰落模型,因为它具有覆盖不同信道条件的灵活能力,并得到了最近在各种新兴5G场景中进行的许多测量活动的支持。所分析的方案由多个具有广义高阶M-QAM传输的“探测并转发”中继组成。多跳通信的端到端性能是根据中断概率、误码率和遍历容量来评估的。对于所有这些指标,我们给出了精确的封闭形式表达式,其中一些用梅杰g函数表示。数值结果验证了分析结果,并通过蒙特卡罗模拟对不同系统和信道参数下所得结果的准确性进行了评估。
{"title":"Closed-form performance analysis of generalized M-QAM over multihop weibull fading channels","authors":"A. Soulimani, M. Benjillali","doi":"10.1109/WINCOM.2015.7381309","DOIUrl":"https://doi.org/10.1109/WINCOM.2015.7381309","url":null,"abstract":"In this paper, we present a closed-form performance analysis of multihop cooperative schemes in the context of the global effort towards the design of future 5G systems. We adopt the advocated Weibull channel fading model for its flexible ability to cover different channel conditions, and supported by many recent measurement campaigns in various emerging 5G scenarios. The analyzed scheme consists of multiple \"Detect-and-Forward\" relays with generalized high-order M-QAM transmissions. The end-to-end performance of the multihop communication is evaluated in terms of the outage probability, bit error rate, and ergodic capacity. For all these metrics, we present exact closed-form expressions, some in terms of the Meijer's G-function. Numerical results illustrate the analysis, and Monte-Carlo simulations assess the accuracy of our obtained results for different system and channel parameters.","PeriodicalId":389513,"journal":{"name":"2015 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131514297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
PRoPHET-RAIP5: A new approach to secure routing in wireless sensor networks 无线传感器网络中安全路由的一种新方法
Pub Date : 2015-10-01 DOI: 10.1109/WINCOM.2015.7381307
Ridouane El Mezouary, Abdellah Houmz, Jamila Jalil, M. Elkoutbi
Probabilistic routing in wireless sensor network (WSNs) use the mobility history when making a forwarding decision. This type of routing provides a very rapid development and new perspectives in WSNs. However, there are several constraints and challenges to overcome the security problems. In this paper, we propose a security solution based on the RAID5 technology and a multi-path routing, to develop a protective mechanism against the various attacks in mobile WSNs. To demonstrate our concept, we have implemented this solution on Probabilistic Routing Protocol using History of Encounters and Transitivity (PRoPHET). We have compared our new protocol (PRoPHET-RAIP5) with standard PRoPHET to enhance security parameters.
无线传感器网络中的概率路由在进行转发决策时使用移动历史。这种类型的路由为无线传感器网络提供了一个非常迅速的发展和新的前景。但是,要克服安全问题,还存在一些制约因素和挑战。本文提出了一种基于RAID5技术和多路径路由的安全解决方案,以建立一种针对移动无线传感器网络中各种攻击的保护机制。为了证明我们的概念,我们在概率路由协议上实现了这个解决方案,使用了相遇历史和传递性(PRoPHET)。我们将我们的新协议(PRoPHET- raip5)与标准的PRoPHET进行了比较,以增强安全参数。
{"title":"PRoPHET-RAIP5: A new approach to secure routing in wireless sensor networks","authors":"Ridouane El Mezouary, Abdellah Houmz, Jamila Jalil, M. Elkoutbi","doi":"10.1109/WINCOM.2015.7381307","DOIUrl":"https://doi.org/10.1109/WINCOM.2015.7381307","url":null,"abstract":"Probabilistic routing in wireless sensor network (WSNs) use the mobility history when making a forwarding decision. This type of routing provides a very rapid development and new perspectives in WSNs. However, there are several constraints and challenges to overcome the security problems. In this paper, we propose a security solution based on the RAID5 technology and a multi-path routing, to develop a protective mechanism against the various attacks in mobile WSNs. To demonstrate our concept, we have implemented this solution on Probabilistic Routing Protocol using History of Encounters and Transitivity (PRoPHET). We have compared our new protocol (PRoPHET-RAIP5) with standard PRoPHET to enhance security parameters.","PeriodicalId":389513,"journal":{"name":"2015 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114996675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2015 International Conference on Wireless Networks and Mobile Communications (WINCOM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1