首页 > 最新文献

2009 International Conference on Networks Security, Wireless Communications and Trusted Computing最新文献

英文 中文
Performance Evaluation of IPv4 and IPv6 on Windows Vista and Linux Ubuntu IPv4和IPv6在Windows Vista和Linux Ubuntu上的性能评估
S. Narayan, Peng Shang, Na Fan
A small network of computing devices that started as ARPANET project in early 1980s is now a worldwide network of devices for billions of users. This global network, the Internet, has become an integral part of worldwide economy and life of individuals. Internet Protocol (IP) v4 is the basic building block of the Internet and has served well, but it has limitations that hinder its growth. The solution is IPv6, which addresses inherent problems of the earlier version. However, due to the increased overhead in IPv6 and its interaction with the operating system that hosts this communication protocol, there may be network performance issues. In this paper, two operating systems namely, Windows Vista and Linux Ubuntu are configured with the two versions of IP and empirically evaluated for performance difference. Performance related metrics like throughput, delay, jitter and CPU usage are empirically measured on a test-bed implementation. The results show that network performance depends not only on IP version and traffic type, but also on the choice of the operating system.
一个小型的计算设备网络,始于20世纪80年代初的阿帕网项目,现在是一个拥有数十亿用户的全球设备网络。这个全球性的网络,因特网,已经成为世界经济和个人生活的一个组成部分。Internet Protocol (IP) v4是Internet的基本构建块,并且服务良好,但是它有一些限制,阻碍了它的发展。解决方案是IPv6,它解决了早期版本的固有问题。然而,由于IPv6的开销增加以及它与承载该通信协议的操作系统的交互,可能会出现网络性能问题。本文以Windows Vista和Linux Ubuntu两种操作系统配置两个版本的IP,并对性能差异进行实证评估。与性能相关的指标,如吞吐量、延迟、抖动和CPU使用率,都是在测试平台上进行经验测量的。结果表明,网络性能不仅与IP版本和流量类型有关,还与操作系统的选择有关。
{"title":"Performance Evaluation of IPv4 and IPv6 on Windows Vista and Linux Ubuntu","authors":"S. Narayan, Peng Shang, Na Fan","doi":"10.1109/NSWCTC.2009.368","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.368","url":null,"abstract":"A small network of computing devices that started as ARPANET project in early 1980s is now a worldwide network of devices for billions of users. This global network, the Internet, has become an integral part of worldwide economy and life of individuals. Internet Protocol (IP) v4 is the basic building block of the Internet and has served well, but it has limitations that hinder its growth. The solution is IPv6, which addresses inherent problems of the earlier version. However, due to the increased overhead in IPv6 and its interaction with the operating system that hosts this communication protocol, there may be network performance issues. In this paper, two operating systems namely, Windows Vista and Linux Ubuntu are configured with the two versions of IP and empirically evaluated for performance difference. Performance related metrics like throughput, delay, jitter and CPU usage are empirically measured on a test-bed implementation. The results show that network performance depends not only on IP version and traffic type, but also on the choice of the operating system.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134048829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Initialization Method of Gene Library Based on Teiresias Algorithm 基于Teiresias算法的基因库初始化方法
D. You-xiang, Huang Min, Xu Jiuyun
this paper analyses the problems and disadvantages of generating detectors in the current intrusion detection system so as to propose a method that can be applied into Teiresias algorithm to initialize gene library, relating with the ways of generating detectors by using the gene library based on the artificial immune theory. By using Teiresias algorithm to preprocess the non-self data, we can get a more effective variable-length sequence pattern that can reflect the non-self characteristics. Using this pattern, which is relatively independent, complete and meaningful, to initialize the gene library can make the gene library more optimized, and this will greatly improve the efficiency and accuracy of intrusion detection system.
本文分析了当前入侵检测系统中生成检测器存在的问题和不足,提出了一种可应用于Teiresias算法初始化基因库的方法,以及基于人工免疫理论的利用基因库生成检测器的方法。利用Teiresias算法对非自数据进行预处理,可以得到更有效地反映非自特征的变长序列模式。利用这种相对独立、完整、有意义的模式对基因文库进行初始化,可以使基因文库更加优化,从而大大提高入侵检测系统的效率和准确性。
{"title":"Initialization Method of Gene Library Based on Teiresias Algorithm","authors":"D. You-xiang, Huang Min, Xu Jiuyun","doi":"10.1109/NSWCTC.2009.119","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.119","url":null,"abstract":"this paper analyses the problems and disadvantages of generating detectors in the current intrusion detection system so as to propose a method that can be applied into Teiresias algorithm to initialize gene library, relating with the ways of generating detectors by using the gene library based on the artificial immune theory. By using Teiresias algorithm to preprocess the non-self data, we can get a more effective variable-length sequence pattern that can reflect the non-self characteristics. Using this pattern, which is relatively independent, complete and meaningful, to initialize the gene library can make the gene library more optimized, and this will greatly improve the efficiency and accuracy of intrusion detection system.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131892677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A New Reputation-Based Trust Management Strategy for Clustered Ad Hoc Networks 基于信誉的集群自组网信任管理策略
Li Xu, Yihui Zhang
To overcome the issue of limited information about unfamiliar nodes and to reduce the required memory space, a reputation-based trust management strategy for clustered ad hoc networks is proposed in this paper. Basically, our solution begin with gathering neighboring nodes as a cluster with a node selected as the cluster head who is responsible of issuing a trust certificate to every cluster member. Then we propose the method of combining trust ratings and modified Bayesian in the information exchange and reputation judgment. The network is not susceptible to damage from selfish or malicious nodes easily and efficiently. Finally, Analysis of the strategy and performance simulation is also presented.
为了克服不熟悉节点信息有限的问题,减少集群自组织网络所需的内存空间,提出了一种基于信誉的集群自组织网络信任管理策略。基本上,我们的解决方案首先将邻近节点聚集为一个集群,并选择一个节点作为集群头,负责向每个集群成员颁发信任证书。在此基础上,提出了信息交换与信誉判断中信任评级与修正贝叶斯相结合的方法。网络不容易受到自私或恶意节点的破坏。最后,对策略进行了分析,并进行了性能仿真。
{"title":"A New Reputation-Based Trust Management Strategy for Clustered Ad Hoc Networks","authors":"Li Xu, Yihui Zhang","doi":"10.1109/NSWCTC.2009.265","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.265","url":null,"abstract":"To overcome the issue of limited information about unfamiliar nodes and to reduce the required memory space, a reputation-based trust management strategy for clustered ad hoc networks is proposed in this paper. Basically, our solution begin with gathering neighboring nodes as a cluster with a node selected as the cluster head who is responsible of issuing a trust certificate to every cluster member. Then we propose the method of combining trust ratings and modified Bayesian in the information exchange and reputation judgment. The network is not susceptible to damage from selfish or malicious nodes easily and efficiently. Finally, Analysis of the strategy and performance simulation is also presented.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134156264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Time-decay Based P2P Trust Model 基于时间衰减的P2P信任模型
Yong Zhang, Kewen Wang, Keqiu Li, W. Qu, Yang Xiang
This paper proposes a time-decay based trust model in peer-to-peer networks. Through the transaction time is faded, the proposed model makes trust value changed dynamically with time decay, which achieves the goal that the more transaction close to, the more reliable it is. Finally this paper presents the experimental protocol and simulation. The experimental result shows that the proposed model is more approached fact value and it can resist vicious association attraction, dynamic strategy attraction, and it has a favorable performance.
提出了一种基于时间衰减的点对点网络信任模型。该模型通过对交易时间进行衰减,使信任值随时间衰减而动态变化,达到交易越接近越可靠的目的。最后给出了实验方案和仿真。实验结果表明,该模型更接近事实值,能够抵抗恶性关联吸引、动态策略吸引,具有良好的性能。
{"title":"A Time-decay Based P2P Trust Model","authors":"Yong Zhang, Kewen Wang, Keqiu Li, W. Qu, Yang Xiang","doi":"10.1109/NSWCTC.2009.98","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.98","url":null,"abstract":"This paper proposes a time-decay based trust model in peer-to-peer networks. Through the transaction time is faded, the proposed model makes trust value changed dynamically with time decay, which achieves the goal that the more transaction close to, the more reliable it is. Finally this paper presents the experimental protocol and simulation. The experimental result shows that the proposed model is more approached fact value and it can resist vicious association attraction, dynamic strategy attraction, and it has a favorable performance.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133826758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Analysis and Design of the Classification Management on the Information Content Security Based on the Label 基于标签的信息内容安全分类管理的分析与设计
Junhua He, S. Mao
As the Internet is a lack of effective information management tools, adopting a classification markings on the Internet for information management, and has designed a hierarchical structure of the security labels Protection measures, an analysis of management at different levels in the framework of a number of key technologies and security tag technology. The system has a certain value on the proliferation of content on the Internet today.
由于互联网缺乏有效的信息管理工具,采用分类标记对互联网上的信息进行管理,并设计了分层结构的防伪标签保护措施,分析了在不同层次管理框架下的若干关键技术和防伪标签技术。该系统在互联网内容泛滥的今天具有一定的应用价值。
{"title":"Analysis and Design of the Classification Management on the Information Content Security Based on the Label","authors":"Junhua He, S. Mao","doi":"10.1109/NSWCTC.2009.308","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.308","url":null,"abstract":"As the Internet is a lack of effective information management tools, adopting a classification markings on the Internet for information management, and has designed a hierarchical structure of the security labels Protection measures, an analysis of management at different levels in the framework of a number of key technologies and security tag technology. The system has a certain value on the proliferation of content on the Internet today.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122944303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Object Packaging Based Cache Scheme for GPRS Network 一种基于对象封装的GPRS网络缓存方案
Xiaohui Chen, Weidong Wang, Xiaowei Qin, Guo Wei
In this paper, we proposed an object packaging based cache scheme for GPRS network. Our study demonstrated that better performance can be achieved when packaging utilized. In addition, the scheme can be used for other resource limited networks.
本文提出了一种基于对象封装的GPRS网络缓存方案。我们的研究表明,更好的性能可以实现时,包装利用。此外,该方案还可用于其他资源有限的网络。
{"title":"An Object Packaging Based Cache Scheme for GPRS Network","authors":"Xiaohui Chen, Weidong Wang, Xiaowei Qin, Guo Wei","doi":"10.1109/NSWCTC.2009.139","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.139","url":null,"abstract":"In this paper, we proposed an object packaging based cache scheme for GPRS network. Our study demonstrated that better performance can be achieved when packaging utilized. In addition, the scheme can be used for other resource limited networks.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122935493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research of Secure Multicast Key Management Protocol Based on Fault-Tolerant Mechanism 基于容错机制的安全组播密钥管理协议研究
Guangwei Liu, Jian Xu, Mengmeng Cao, Fu-cai Zhou, Bin Zhang
As multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet, the research of the multicast key management is becoming a hot issue. Firstly, we analyze the n-party GDH.2 multicast key management protocol and point out that it has the following flaws: lack of certification, vulnerability to man-in-the-middle attacks, and a single-point failure. In order to settle the issues mentioned above, a fault-tolerant and secure multicast key management protocol (FTS, for short) with using the fault-tolerant algorithm and the password authentication mechanism is proposed in this paper. In our protocol, legal members are able to agree on a key despite failures of other members. The protocol can also prevent man-in-the-middle attacks. Finally, we evaluate the security of FTS, and compare our protocol with the FTKM through performance analysis. The analytic results show that the protocol not only avoids the single-point failure but also improves the comprehensive performance.
随着组播作为一种高效的通信机制在面向组的Internet应用中得到越来越多的应用,对组播密钥管理的研究成为一个热点问题。首先,分析了n方GDH.2组播密钥管理协议,指出该协议存在缺乏认证、易受中间人攻击、单点故障等缺陷。为了解决上述问题,本文提出了一种采用容错算法和密码认证机制的容错安全组播密钥管理协议(FTS)。在我们的协议中,合法成员能够在其他成员失败的情况下就密钥达成一致。该协议还可以防止中间人攻击。最后,我们评估了FTKM协议的安全性,并通过性能分析将我们的协议与FTKM协议进行了比较。分析结果表明,该协议不仅避免了单点故障,而且提高了综合性能。
{"title":"Research of Secure Multicast Key Management Protocol Based on Fault-Tolerant Mechanism","authors":"Guangwei Liu, Jian Xu, Mengmeng Cao, Fu-cai Zhou, Bin Zhang","doi":"10.1109/NSWCTC.2009.273","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.273","url":null,"abstract":"As multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet, the research of the multicast key management is becoming a hot issue. Firstly, we analyze the n-party GDH.2 multicast key management protocol and point out that it has the following flaws: lack of certification, vulnerability to man-in-the-middle attacks, and a single-point failure. In order to settle the issues mentioned above, a fault-tolerant and secure multicast key management protocol (FTS, for short) with using the fault-tolerant algorithm and the password authentication mechanism is proposed in this paper. In our protocol, legal members are able to agree on a key despite failures of other members. The protocol can also prevent man-in-the-middle attacks. Finally, we evaluate the security of FTS, and compare our protocol with the FTKM through performance analysis. The analytic results show that the protocol not only avoids the single-point failure but also improves the comprehensive performance.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115795501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Channel Estimation for PRP-OFDM in Underwater Acoustic Communication System 水声通信系统中PRP-OFDM的信道估计
Jinlong Xian, Zhonglei Zhang
Orthogonal Frequency Division Multiplexing (OFDM) is a method that can combat multi-paths, fully use the frequency band, has high data rate and has a promising future in UWA communication. While longer the transmission range, worse the underwater conditions with multi-paths and Doppler offset, which needs to design the system parameters and take practical methods to improve the system. In this paper, a new PRP-OFDM (A Pseudo random Postfix OFDM) algorithm is proposed, which has a good performance and low-complexity.
正交频分复用技术(OFDM)是一种具有抗多径、充分利用频带、数据速率高、在UWA通信中具有广阔应用前景的技术。而传输距离越长,多径和多普勒偏置的水下条件越差,这就需要对系统参数进行设计,并采取切实可行的方法对系统进行改进。本文提出了一种性能好、复杂度低的伪随机后置OFDM (PRP-OFDM)算法。
{"title":"Channel Estimation for PRP-OFDM in Underwater Acoustic Communication System","authors":"Jinlong Xian, Zhonglei Zhang","doi":"10.1109/NSWCTC.2009.161","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.161","url":null,"abstract":"Orthogonal Frequency Division Multiplexing (OFDM) is a method that can combat multi-paths, fully use the frequency band, has high data rate and has a promising future in UWA communication. While longer the transmission range, worse the underwater conditions with multi-paths and Doppler offset, which needs to design the system parameters and take practical methods to improve the system. In this paper, a new PRP-OFDM (A Pseudo random Postfix OFDM) algorithm is proposed, which has a good performance and low-complexity.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122196547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
P2P-based E-commerce Trust Model and Strategies 基于p2p的电子商务信任模型与策略
Chen Xin
This article, from the prospect of P2P e-commerce advantages and challenges, discusses the risks of P2P e-commerce issues, and points out that trust is the basis of all business activities. Business organizations should take certain measures against risks from P2P e-commerce. The effective confidence-building mechanism can enable e-commerce more secure, reduce the risk of people's expectations, and enhance confidence in the P2P e-commerce. Taking into account the needs of e-commerce data security, this paper provides P2P-based e-commerce trust model. This model has inherited the advantages of traditional P2P model, combined with confidence-building mechanism to check for the main business in order to provide a highly reliable low-cost application.
本文从P2P电子商务优势与挑战的前景出发,探讨了P2P电子商务存在的风险问题,并指出信任是一切商业活动的基础。商业机构应对P2P电子商务带来的风险采取一定的措施。有效的信任机制可以使电子商务更加安全,降低人们期望的风险,增强人们对P2P电子商务的信心。考虑到电子商务数据安全的需要,本文提出了基于p2p的电子商务信任模型。该模式继承了传统P2P模式的优点,结合建立信任机制对主业进行检查,从而提供高可靠的低成本应用。
{"title":"P2P-based E-commerce Trust Model and Strategies","authors":"Chen Xin","doi":"10.1109/NSWCTC.2009.372","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.372","url":null,"abstract":"This article, from the prospect of P2P e-commerce advantages and challenges, discusses the risks of P2P e-commerce issues, and points out that trust is the basis of all business activities. Business organizations should take certain measures against risks from P2P e-commerce. The effective confidence-building mechanism can enable e-commerce more secure, reduce the risk of people's expectations, and enhance confidence in the P2P e-commerce. Taking into account the needs of e-commerce data security, this paper provides P2P-based e-commerce trust model. This model has inherited the advantages of traditional P2P model, combined with confidence-building mechanism to check for the main business in order to provide a highly reliable low-cost application.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124564737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Subcarrier and Power Allocation in Uplink OFDMA Systems with Incomplete Channel State Information 信道状态信息不完全的上行OFDMA系统联合子载波与功率分配
Dan Wu, Yueming Cai, Chengkang Pan
A joint subcarrier and power allocation in uplink OFDMA systems with incomplete channel state information is proposed. The subcarrier allocation problem is considered as a multi-player discrete, stochastic and finite strategy game, and equal power is allocated to the subcarriers of each user. Particularly, the utility function is based on the channel capability and adds the pricing scheme to guarantee the fairness. The subcarrier allocation is different from the traditional scheme in which the subcarriers are allocated passively. In our process, each of the subcarriers is viewed as a learning automaton to choose the most satisfying user. We adopt the linear reward-inaction algorithm to obtain the Nash equilibrium. Theoretic analysis is given. Simulation results show our allocation scheme has good convergence, and the performance gap is tolerated compared with the complete channel state case.
针对信道状态信息不完全的上行OFDMA系统,提出了一种联合子载波和功率分配方法。将子载波分配问题视为一个多参与者的离散、随机和有限策略博弈问题,并将相等的功率分配给每个用户的子载波。其中,效用函数以渠道能力为基础,增加了定价方案,保证了公平性。子载波分配不同于传统的被动子载波分配方案。在我们的过程中,每个子载波被视为一个学习自动机,以选择最满意的用户。我们采用线性奖励-不作为算法来获得纳什均衡。给出了理论分析。仿真结果表明,该分配方案具有较好的收敛性,与完全信道状态的情况相比,性能差距是可以容忍的。
{"title":"Joint Subcarrier and Power Allocation in Uplink OFDMA Systems with Incomplete Channel State Information","authors":"Dan Wu, Yueming Cai, Chengkang Pan","doi":"10.1109/NSWCTC.2009.58","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.58","url":null,"abstract":"A joint subcarrier and power allocation in uplink OFDMA systems with incomplete channel state information is proposed. The subcarrier allocation problem is considered as a multi-player discrete, stochastic and finite strategy game, and equal power is allocated to the subcarriers of each user. Particularly, the utility function is based on the channel capability and adds the pricing scheme to guarantee the fairness. The subcarrier allocation is different from the traditional scheme in which the subcarriers are allocated passively. In our process, each of the subcarriers is viewed as a learning automaton to choose the most satisfying user. We adopt the linear reward-inaction algorithm to obtain the Nash equilibrium. Theoretic analysis is given. Simulation results show our allocation scheme has good convergence, and the performance gap is tolerated compared with the complete channel state case.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125250531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2009 International Conference on Networks Security, Wireless Communications and Trusted Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1