The world moves into a new era with the advent of the Internet of Things (IoT). This technology changes many things from daily life to society as a whole. To use the technology, data are the fundamental factors. If more sensor data is generated, more information or more specific information can be provided to people. Some of the technologies for collecting data are the various Medium Access Control (MAC) protocols. Especially for the IoT System, the Wireless Sensor Network (WSN) MAC protocols have been proposed among the MAC protocols. However, even among the WSN MAC protocols, there are many of them. Each of them has its own characteristics. Some of them depend on the places where the MAC protocol operates. Previously, WSN is usually composed of the stationary sensors. This static environment has changed as the technologies are advanced in many ways. Not only is it possible for sensors to move around, but sinks can also move around. In real life, these various sensors are mixed. Thus, MAC protocols for WSN with stationary sensors and mobile sensors are needed. In this paper, we propose an Anchor-based Group Relay-MAC (AGR-MAC) for the WSN with mixed sensors.
{"title":"Anchor-Based Group Relay MAC","authors":"Ahreum Shin, Myeongseung Han, Yoonkyung Jang, Intae Ryoo","doi":"10.1109/ICOIN.2019.8717983","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8717983","url":null,"abstract":"The world moves into a new era with the advent of the Internet of Things (IoT). This technology changes many things from daily life to society as a whole. To use the technology, data are the fundamental factors. If more sensor data is generated, more information or more specific information can be provided to people. Some of the technologies for collecting data are the various Medium Access Control (MAC) protocols. Especially for the IoT System, the Wireless Sensor Network (WSN) MAC protocols have been proposed among the MAC protocols. However, even among the WSN MAC protocols, there are many of them. Each of them has its own characteristics. Some of them depend on the places where the MAC protocol operates. Previously, WSN is usually composed of the stationary sensors. This static environment has changed as the technologies are advanced in many ways. Not only is it possible for sensors to move around, but sinks can also move around. In real life, these various sensors are mixed. Thus, MAC protocols for WSN with stationary sensors and mobile sensors are needed. In this paper, we propose an Anchor-based Group Relay-MAC (AGR-MAC) for the WSN with mixed sensors.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127281844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/ICOIN.2019.8718175
Wentao Zhou, Y. Shin
Magnetic induction (MI) communication is widely used in underground and underwater environments. However, there is a large path loss in MI system and the 3-dB bandwidth of the system is narrow, which means that the available bandwidth of the communication system is limited. It is important to increase the number of bits per unit bandwidth. Orthogonal frequency division multiplexing (OFDM) can effectively improve the spectrum efficiency. In this paper, OFDM is used in the underwater MI communication system model and compared with the single carrier modulation in terms of spectrum efficiency and bit error rate. The results indicate that the underwater MI using OFDM modulation is better than the single carrier modulation in spectrum efficiency.
{"title":"Application of OFDM in Underwater Magnetic Induction Communication","authors":"Wentao Zhou, Y. Shin","doi":"10.1109/ICOIN.2019.8718175","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718175","url":null,"abstract":"Magnetic induction (MI) communication is widely used in underground and underwater environments. However, there is a large path loss in MI system and the 3-dB bandwidth of the system is narrow, which means that the available bandwidth of the communication system is limited. It is important to increase the number of bits per unit bandwidth. Orthogonal frequency division multiplexing (OFDM) can effectively improve the spectrum efficiency. In this paper, OFDM is used in the underwater MI communication system model and compared with the single carrier modulation in terms of spectrum efficiency and bit error rate. The results indicate that the underwater MI using OFDM modulation is better than the single carrier modulation in spectrum efficiency.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127133618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/ICOIN.2019.8718161
A. M. Noma, A. Muhammad
This paper shows that stochastic heuristic approach for implicitly solving addition chain problem (ACP) in public-key cryptosystem (PKC) enhances the efficiency of the PKC and improves the security by blinding the multiplications/squaring operations involved against side-channel attack (SCA). We show that while the current practical heuristic approaches being deterministic expose the fixed pattern of the operations, using stochastic method blinds the pattern by being unpredictable and generating diffident pattern of operation for the same exponent at a different time. Thus, if the addition chain (AC) is generated implicitly every time the exponentiation operation is being made, needless for such approaches as padding by insertion of dummy operations and the operation is still totally secured against the SCA. Furthermore, we also show that the stochastic approaches, when carefully designed, further reduces the length of the operation than state-of-the-art practical methods for improving the efficiency. We demonstrated our investigation by implementing RSA cryptosystem using the stochastic approach and the results benchmarked with the existing current methods.
{"title":"Stochastic Heuristic Approach to Addition Chain Problem in PKC for Efficiency and Security Effectiveness","authors":"A. M. Noma, A. Muhammad","doi":"10.1109/ICOIN.2019.8718161","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718161","url":null,"abstract":"This paper shows that stochastic heuristic approach for implicitly solving addition chain problem (ACP) in public-key cryptosystem (PKC) enhances the efficiency of the PKC and improves the security by blinding the multiplications/squaring operations involved against side-channel attack (SCA). We show that while the current practical heuristic approaches being deterministic expose the fixed pattern of the operations, using stochastic method blinds the pattern by being unpredictable and generating diffident pattern of operation for the same exponent at a different time. Thus, if the addition chain (AC) is generated implicitly every time the exponentiation operation is being made, needless for such approaches as padding by insertion of dummy operations and the operation is still totally secured against the SCA. Furthermore, we also show that the stochastic approaches, when carefully designed, further reduces the length of the operation than state-of-the-art practical methods for improving the efficiency. We demonstrated our investigation by implementing RSA cryptosystem using the stochastic approach and the results benchmarked with the existing current methods.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128911391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/ICOIN.2019.8718109
Yuki Maehara, Toshiro Nunome
In this paper, we implement a Multi-View Video and Audio (MVV-A) transmission system utilizing WebRTC media channel, which employs UDP-based transmission into Web technologies, to enhance QoE under large delay. According to viewpoint change requests, this system switches audiovisual streams. We compare QoE with MVV-A transmission using MPEG-DASH, which employs HTTP/TCP, through a subjective experiment with various network conditions. As transmission methods utilizing MPEG-DASH, we treat single viewpoint transmission and simultaneous transmission of all the viewpoints. As a result, we find that the MVV-A transmission with WebRTC achieves higher QoE than that with MPEG-DASH under large delay.
{"title":"WebRTC-Based Multi-View Video and Audio Transmission and its QoE","authors":"Yuki Maehara, Toshiro Nunome","doi":"10.1109/ICOIN.2019.8718109","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718109","url":null,"abstract":"In this paper, we implement a Multi-View Video and Audio (MVV-A) transmission system utilizing WebRTC media channel, which employs UDP-based transmission into Web technologies, to enhance QoE under large delay. According to viewpoint change requests, this system switches audiovisual streams. We compare QoE with MVV-A transmission using MPEG-DASH, which employs HTTP/TCP, through a subjective experiment with various network conditions. As transmission methods utilizing MPEG-DASH, we treat single viewpoint transmission and simultaneous transmission of all the viewpoints. As a result, we find that the MVV-A transmission with WebRTC achieves higher QoE than that with MPEG-DASH under large delay.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123711119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/ICOIN.2019.8718182
M. Kamruzzaman, N. Sarkar, Jairo Gutiérrez, S. K. Ray
Device-to-Device (D2D) communication is becoming more popular research topic among the network researchers and engineers across the globe This popularity is due to various key applications of D2D communications including 4G LTE-A envisioning the continuous evolution of current cellular networks into 5G to support a much larger and diverse range of applications. D2D communications play an important role to fulfill the quality of service (QoS) requirements for 5G networks. However, to realize the performance gain of D2D communications, various open challenges need to be resolved including mode selection (MS). This paper, therefore proposes a new mode selection algorithm for D2D enabled heterogeneous 5G cellular network. By quantifying the key parameters we mitigate interference that affect the system performance, and finally proposed an algorithm for optimal selection of transmission mode in a heterogeneous cellular network. The findings reported in this paper provide some insights into the design of 5G networks that may help network designer and engineers to contribute further towards the development of next generation wireless networks.
{"title":"A Mode Selection Algorithm for Mitigating Interference in D2D Enabled Next-Generation Heterogeneous Cellular Networks","authors":"M. Kamruzzaman, N. Sarkar, Jairo Gutiérrez, S. K. Ray","doi":"10.1109/ICOIN.2019.8718182","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718182","url":null,"abstract":"Device-to-Device (D2D) communication is becoming more popular research topic among the network researchers and engineers across the globe This popularity is due to various key applications of D2D communications including 4G LTE-A envisioning the continuous evolution of current cellular networks into 5G to support a much larger and diverse range of applications. D2D communications play an important role to fulfill the quality of service (QoS) requirements for 5G networks. However, to realize the performance gain of D2D communications, various open challenges need to be resolved including mode selection (MS). This paper, therefore proposes a new mode selection algorithm for D2D enabled heterogeneous 5G cellular network. By quantifying the key parameters we mitigate interference that affect the system performance, and finally proposed an algorithm for optimal selection of transmission mode in a heterogeneous cellular network. The findings reported in this paper provide some insights into the design of 5G networks that may help network designer and engineers to contribute further towards the development of next generation wireless networks.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133636982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/ICOIN.2019.8718135
Jincheol Kwon, N. Kim, Moonjoong Kang, Jong WonKim
With the rapid spread of cloud-native computing paradigm, the utilization of cloud has been maturing to accommodate versatile microservices-based application services with agility and scalability. However, in case of HPDA (high-performance data analytics) workload, the transition toward cloud-native-style computing infrastructure is still facing several hurdles to realize container-enabled clusters. To address technical constraints around bottlenecked inter-connections for overlay networking and storage access, in this paper, we design and prototype a container-enabled cluster that effectively and seamlessly integrate the hardware and software pieces of HPDA cluster.
{"title":"Design and Prototyping of Container-Enabled Cluster for High Performance Data Analytics","authors":"Jincheol Kwon, N. Kim, Moonjoong Kang, Jong WonKim","doi":"10.1109/ICOIN.2019.8718135","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718135","url":null,"abstract":"With the rapid spread of cloud-native computing paradigm, the utilization of cloud has been maturing to accommodate versatile microservices-based application services with agility and scalability. However, in case of HPDA (high-performance data analytics) workload, the transition toward cloud-native-style computing infrastructure is still facing several hurdles to realize container-enabled clusters. To address technical constraints around bottlenecked inter-connections for overlay networking and storage access, in this paper, we design and prototype a container-enabled cluster that effectively and seamlessly integrate the hardware and software pieces of HPDA cluster.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130298196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/ICOIN.2019.8718180
Taketo Fukushima, M. Iio, K. Hirata, M. Yamamoto
In-network caching is a technique that stores contents in caches of routers, and thus reduces the loads for content servers and networks. To further enhance the performance of in-network caching, this paper proposes a popularity-based content cache management method. The proposed method divides the cached contents into some groups based on their popularity and manages information on content placement of each group in a distributed manner with a distributed hash table mechanism. The proposed method enables users to download contents stored in near routers with low overheads. This paper shows that the proposed method enhances the cache utilization efficiently through simulation experiments.
{"title":"Popularity-Based Content Cache Management for in-Network Caching","authors":"Taketo Fukushima, M. Iio, K. Hirata, M. Yamamoto","doi":"10.1109/ICOIN.2019.8718180","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718180","url":null,"abstract":"In-network caching is a technique that stores contents in caches of routers, and thus reduces the loads for content servers and networks. To further enhance the performance of in-network caching, this paper proposes a popularity-based content cache management method. The proposed method divides the cached contents into some groups based on their popularity and manages information on content placement of each group in a distributed manner with a distributed hash table mechanism. The proposed method enables users to download contents stored in near routers with low overheads. This paper shows that the proposed method enhances the cache utilization efficiently through simulation experiments.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134512557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/ICOIN.2019.8718198
Varun Amrutiya, S. Jhamb, Pranjal Priyadarshi, Ashutosh Bhatia
Two-factor authentication (2FA) is widely prevalent in banking, emails and virtual private networks (VPN) connections or in accessing any secure web service. In 2FA, to get authenticated the users are expected to provide additional secret information along with the password. Typically, this secret information (tokens) is generated by a centralized trusted third party upon receiving an authentication request from users. Thus, this additional layer of security comes at the cost of inherently trusting the third party for their services. The security of such authentication systems is always under the threat of the trusted party is being compromised. In this paper, we propose a novel approach to make server authentication even more secure by building 2FA over the blockchain platform which is distributed in nature. The proposed solution does not require any trusted third party between claimant (user) and the verifier (server) for the authentication purpose. To demonstrate the idea of using blockchain technology for 2FA, we have added an extra layer of security component to the OpenSSH server a widely used application for Secure Shell (SSH) protocol.
{"title":"Trustless Two-Factor Authentication Using Smart Contracts in Blockchains","authors":"Varun Amrutiya, S. Jhamb, Pranjal Priyadarshi, Ashutosh Bhatia","doi":"10.1109/ICOIN.2019.8718198","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718198","url":null,"abstract":"Two-factor authentication (2FA) is widely prevalent in banking, emails and virtual private networks (VPN) connections or in accessing any secure web service. In 2FA, to get authenticated the users are expected to provide additional secret information along with the password. Typically, this secret information (tokens) is generated by a centralized trusted third party upon receiving an authentication request from users. Thus, this additional layer of security comes at the cost of inherently trusting the third party for their services. The security of such authentication systems is always under the threat of the trusted party is being compromised. In this paper, we propose a novel approach to make server authentication even more secure by building 2FA over the blockchain platform which is distributed in nature. The proposed solution does not require any trusted third party between claimant (user) and the verifier (server) for the authentication purpose. To demonstrate the idea of using blockchain technology for 2FA, we have added an extra layer of security component to the OpenSSH server a widely used application for Secure Shell (SSH) protocol.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116943978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/ICOIN.2019.8718173
Yuya Kumai, Koki Hongyo, Tomotaka Kimura, K. Hirata
In the past, the concept of self-evolving botnets, where computing resources of infected hosts are exploited to discover vulnerabilities, have been introduced in the literature. This paper proposes a deterministic epidemic model that represents the infection dynamics of self-evolving botnets. The proposed epidemic model represents the infection dynamics of the self-evolving botnet with ordinary differential equations based on a Susceptible-Infected-Recovered-Susceptible model, which is widely used for general epidemic models of malware infection. Through numerical calculations, we show the infection behavior of self-evolving botnets.
{"title":"Infection Dynamics of Self-Evolving Botnets with Deterministic Modeling","authors":"Yuya Kumai, Koki Hongyo, Tomotaka Kimura, K. Hirata","doi":"10.1109/ICOIN.2019.8718173","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718173","url":null,"abstract":"In the past, the concept of self-evolving botnets, where computing resources of infected hosts are exploited to discover vulnerabilities, have been introduced in the literature. This paper proposes a deterministic epidemic model that represents the infection dynamics of self-evolving botnets. The proposed epidemic model represents the infection dynamics of the self-evolving botnet with ordinary differential equations based on a Susceptible-Infected-Recovered-Susceptible model, which is widely used for general epidemic models of malware infection. Through numerical calculations, we show the infection behavior of self-evolving botnets.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116416239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/ICOIN.2019.8718195
Yoshihiro Masuda, E. Okamoto, Keita Ito, Tetsuya Yamamoto
Fifth generation mobile communications system (5G) that enables large transmission capacity (over 10 Gbps) is currently standardized and under development. Non-orthogonal multiple access (NOMA) scheme is a typical core technology for 5G. On the other hand, we had proposed earlier a chaos multiple-input multiple-output (C-MIMO) transmission scheme that harnesses the strengths of the chaos communication system. C-MIMO exhibits channel coding effect and physical layer security based on a common key encryption that helps realize a secure wireless transmission. Furthermore, based on the C-MIMO, we had proposed a downlink chaos NOMA transmission scheme that realizes physical layer security in NOMA. However, in the conventional studies, an uplink transmission is not considered yet. Therefore, in this paper, we propose an uplink chaos NOMA transmission scheme using C-MIMO to realize a secure and large-capacity uplink transmission. The performance of the proposed scheme is evaluated through numerical simulations.
{"title":"An Uplink Non-Orthogonal Multiple Access Scheme Having Physical Layer Security Based on Chaos Modulation","authors":"Yoshihiro Masuda, E. Okamoto, Keita Ito, Tetsuya Yamamoto","doi":"10.1109/ICOIN.2019.8718195","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718195","url":null,"abstract":"Fifth generation mobile communications system (5G) that enables large transmission capacity (over 10 Gbps) is currently standardized and under development. Non-orthogonal multiple access (NOMA) scheme is a typical core technology for 5G. On the other hand, we had proposed earlier a chaos multiple-input multiple-output (C-MIMO) transmission scheme that harnesses the strengths of the chaos communication system. C-MIMO exhibits channel coding effect and physical layer security based on a common key encryption that helps realize a secure wireless transmission. Furthermore, based on the C-MIMO, we had proposed a downlink chaos NOMA transmission scheme that realizes physical layer security in NOMA. However, in the conventional studies, an uplink transmission is not considered yet. Therefore, in this paper, we propose an uplink chaos NOMA transmission scheme using C-MIMO to realize a secure and large-capacity uplink transmission. The performance of the proposed scheme is evaluated through numerical simulations.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121954772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}