首页 > 最新文献

2016 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)最新文献

英文 中文
Knowledge-based update of primary exclusive region for database-driven spectrum sharing towards 5G 面向5G的数据库驱动频谱共享主专用区的知识更新
Pub Date : 1900-01-01 DOI: 10.1109/WCNC.2016.7564713
S. Yamashita, Koji Yamamoto, T. Nishio, M. Morikura
To realize high-speed and high-capacity 5G mobile networks, secondary users (SUs) may opportunistically use licensed spectrum allocated to primary users (PUs). This paper presents a framework to deal with the situation that occurs when a PU suffers harmful interference caused by the secondary use of the spectrum allocated to it. Here, the PU is assumed to be a radar system. In our proposed framework, the PU informs the database that it is suffering harmful interference. Receiving this information, the database updates the primary exclusive region (PER), where SUs are prohibited from using the licensed spectrum. The updated PER depends on the current knowledge of the SUs, which is stored in the database. We assume a circular PER centered at the primary receiver (PR) and derive its optimal radius using stochastic geometry. For each type of SU knowledge stored in the database, we evaluate the optimal PER radius for a target probability at which the PU suffers harmful interference. The results show that more detailed knowledge of the SU density and transmission powers leads to a smaller updated PER radius. Hence, a more efficient spatial reuse of the licensed spectrum is achieved.
为了实现高速、大容量的5G移动网络,从用户可能会投机性地使用分配给主用户的许可频谱。本文提出了一种框架来处理由于二次使用分配给PU的频谱而导致PU遭受有害干扰的情况。这里,假定PU是一个雷达系统。在我们提出的框架中,PU通知数据库它正在遭受有害干扰。收到此信息后,数据库更新主独占区域(PER),在PER区域中,SUs被禁止使用许可频谱。更新后的PER依赖于存储在数据库中的su的当前知识。我们假设一个以主接收器为中心的圆形PER,并使用随机几何推导出其最佳半径。对于存储在数据库中的每种SU知识,我们评估PU遭受有害干扰的目标概率的最佳PER半径。结果表明,越详细地了解SU密度和传输功率,更新后的PER半径就越小。因此,可以实现更有效的许可频谱空间复用。
{"title":"Knowledge-based update of primary exclusive region for database-driven spectrum sharing towards 5G","authors":"S. Yamashita, Koji Yamamoto, T. Nishio, M. Morikura","doi":"10.1109/WCNC.2016.7564713","DOIUrl":"https://doi.org/10.1109/WCNC.2016.7564713","url":null,"abstract":"To realize high-speed and high-capacity 5G mobile networks, secondary users (SUs) may opportunistically use licensed spectrum allocated to primary users (PUs). This paper presents a framework to deal with the situation that occurs when a PU suffers harmful interference caused by the secondary use of the spectrum allocated to it. Here, the PU is assumed to be a radar system. In our proposed framework, the PU informs the database that it is suffering harmful interference. Receiving this information, the database updates the primary exclusive region (PER), where SUs are prohibited from using the licensed spectrum. The updated PER depends on the current knowledge of the SUs, which is stored in the database. We assume a circular PER centered at the primary receiver (PR) and derive its optimal radius using stochastic geometry. For each type of SU knowledge stored in the database, we evaluate the optimal PER radius for a target probability at which the PU suffers harmful interference. The results show that more detailed knowledge of the SU density and transmission powers leads to a smaller updated PER radius. Hence, a more efficient spatial reuse of the licensed spectrum is achieved.","PeriodicalId":436094,"journal":{"name":"2016 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114541943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient CGA algorithm against DoS attack on Duplicate Address Detection process 重复地址检测过程中抗DoS攻击的有效CGA算法
Pub Date : 1900-01-01 DOI: 10.1109/WCNCW.2016.7552745
Cui Zhang, Jinbo Xiong, Qiong Wu
Neighbor Discovery Protocol (NDP) is significant in mobile network, which enables mobile node randomly access to foreign network by Stateless Link Address Autoconfiguration (SLAAC). However, the NDP initially offers no protection mechanism and is prone to address spoofing and Denial of Service (DoS). Secure Neighbor Discovery Protocol (SeNDP) is proposed to solve these NDP threats. Recently there are many solutions presented in SeNDP which relies on special IPv6 addresses named Cryptographically Generated Address (CGA). But there is little work to defend DoS attack on Duplicate Address Detection (DAD). In our paper, we focus on the problems of CGA and propose a novel time-based monitoring DoS attack. The conventional DoS defense mechanisms are realized by monitoring the packet rating and observing connection delay to analyze various DoS attack. Hence, we adopt a delay as an indication to distinct the DoS attack. We set a timer to control the address generation for monitoring abnormal attack to protect each address configuration. In addition, we adopt SHA-224 hash function instead of SHA-1 to improve the security of address generation. Considering the computation overhead, we decrease the hash matching factor from 16 bits to 8 bits. We develop our scheme using the Network Simulator (NS2) and the OpenSSL library. Finally, experiment results prove our scheme can provide more efficient IP generation. Compared with the CGA algorithm in SeNDP, our time consumption decreases to 10%. From the view of defense attack, our scheme can control DoS attack.
邻居发现协议(NDP)在移动网络中具有重要意义,它通过无状态链路地址自动配置(SLAAC)实现移动节点随机访问外部网络。但是,NDP在初始阶段没有提供任何保护机制,容易受到欺骗和拒绝服务(DoS)攻击。为了解决这些威胁,提出了安全邻居发现协议(SeNDP)。最近在SeNDP中提出了许多基于特殊IPv6地址的解决方案,这些地址被称为加密生成地址(cryptographic Generated Address, CGA)。但是对于重复地址检测(DAD)的DoS攻击的防御工作却很少。本文针对CGA存在的问题,提出了一种基于时间的监控DoS攻击方法。传统的DoS防御机制是通过监测数据包评级和观察连接延迟来分析各种DoS攻击。因此,我们采用延迟作为区分DoS攻击的指示。通过设置定时器控制地址生成,监控异常攻击,保护每个地址配置。此外,我们采用SHA-224哈希函数代替SHA-1来提高地址生成的安全性。考虑到计算开销,我们将哈希匹配因子从16位减少到8位。我们使用网络模拟器(NS2)和OpenSSL库来开发我们的方案。实验结果表明,该方案能够提供更高效的IP生成。与SeNDP中的CGA算法相比,我们的时间消耗降低到10%。从防御攻击的角度来看,我们的方案可以控制DoS攻击。
{"title":"An efficient CGA algorithm against DoS attack on Duplicate Address Detection process","authors":"Cui Zhang, Jinbo Xiong, Qiong Wu","doi":"10.1109/WCNCW.2016.7552745","DOIUrl":"https://doi.org/10.1109/WCNCW.2016.7552745","url":null,"abstract":"Neighbor Discovery Protocol (NDP) is significant in mobile network, which enables mobile node randomly access to foreign network by Stateless Link Address Autoconfiguration (SLAAC). However, the NDP initially offers no protection mechanism and is prone to address spoofing and Denial of Service (DoS). Secure Neighbor Discovery Protocol (SeNDP) is proposed to solve these NDP threats. Recently there are many solutions presented in SeNDP which relies on special IPv6 addresses named Cryptographically Generated Address (CGA). But there is little work to defend DoS attack on Duplicate Address Detection (DAD). In our paper, we focus on the problems of CGA and propose a novel time-based monitoring DoS attack. The conventional DoS defense mechanisms are realized by monitoring the packet rating and observing connection delay to analyze various DoS attack. Hence, we adopt a delay as an indication to distinct the DoS attack. We set a timer to control the address generation for monitoring abnormal attack to protect each address configuration. In addition, we adopt SHA-224 hash function instead of SHA-1 to improve the security of address generation. Considering the computation overhead, we decrease the hash matching factor from 16 bits to 8 bits. We develop our scheme using the Network Simulator (NS2) and the OpenSSL library. Finally, experiment results prove our scheme can provide more efficient IP generation. Compared with the CGA algorithm in SeNDP, our time consumption decreases to 10%. From the view of defense attack, our scheme can control DoS attack.","PeriodicalId":436094,"journal":{"name":"2016 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122211368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
User-centric network selection in multi-RAT systems 多rat系统中以用户为中心的网络选择
Pub Date : 1900-01-01 DOI: 10.1109/WCNC.2016.7564653
Alaa Awad, Amr M. Mohamed, C. Chiasserini
Rising numbers of mobile devices and wireless access technologies motivate network operators to leverage spectrum across multiple radio access networks, in order to significantly enhance quality of service as well as network capacity. However, there is a substantial need to develop innovative network selection mechanisms that consider energy efficiency while meeting application quality requirements. In this context, this paper proposes an efficient network selection mechanism over heterogeneous wireless networks. We consider different performance aspects, as well as network characteristics and application requirements, so as to obtain an efficient solution that grasps the conflicting nature of the various objectives and addresses this ultimate tradeoff. The proposed methodology advocates a user-centric approach toward the utilization of heterogeneous wireless networks to enhance system performance and support reliable connectivity.
移动设备和无线接入技术数量的不断增加促使网络运营商利用多个无线接入网络的频谱,以显著提高服务质量和网络容量。然而,有必要开发创新的网络选择机制,在满足应用质量要求的同时考虑能源效率。在此背景下,本文提出了一种基于异构无线网络的高效网络选择机制。我们考虑不同的性能方面,以及网络特性和应用程序需求,以便获得一个有效的解决方案,掌握各种目标的冲突性质,并解决这个最终的权衡。提出的方法提倡以用户为中心的方法来利用异构无线网络来增强系统性能和支持可靠的连接。
{"title":"User-centric network selection in multi-RAT systems","authors":"Alaa Awad, Amr M. Mohamed, C. Chiasserini","doi":"10.1109/WCNC.2016.7564653","DOIUrl":"https://doi.org/10.1109/WCNC.2016.7564653","url":null,"abstract":"Rising numbers of mobile devices and wireless access technologies motivate network operators to leverage spectrum across multiple radio access networks, in order to significantly enhance quality of service as well as network capacity. However, there is a substantial need to develop innovative network selection mechanisms that consider energy efficiency while meeting application quality requirements. In this context, this paper proposes an efficient network selection mechanism over heterogeneous wireless networks. We consider different performance aspects, as well as network characteristics and application requirements, so as to obtain an efficient solution that grasps the conflicting nature of the various objectives and addresses this ultimate tradeoff. The proposed methodology advocates a user-centric approach toward the utilization of heterogeneous wireless networks to enhance system performance and support reliable connectivity.","PeriodicalId":436094,"journal":{"name":"2016 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124320690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2016 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1